SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:0847-1)

high Nessus Plugin ID 232678

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0847-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672).
- CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937).
- CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235).
- CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438).
- CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949).
- CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).
- CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109).
- CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483).
- CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070).
- CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857).
- CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).
- CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032).
- CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244).
- CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485).
- CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592).
- CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914).
- CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901).
- CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113).
- CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114).
- CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115).
- CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122).
- CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123).
- CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).
- CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684).
- CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680).
- CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681).
- CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682).
- CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683).
- CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685).
- CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).
- CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694).
- CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700).
- CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702).
- CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879).
- CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
- CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525).
- CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889).
- CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891).
- CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860).
- CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863).
- CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877).
- CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494).
- CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496).
- CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509).
- CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753).
- CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759).
- CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739).
- CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1237879

https://bugzilla.suse.com/1237889

https://bugzilla.suse.com/1237891

https://bugzilla.suse.com/1237901

https://bugzilla.suse.com/1237950

https://bugzilla.suse.com/1238214

https://bugzilla.suse.com/1238303

https://bugzilla.suse.com/1238347

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1219367

https://bugzilla.suse.com/1222672

https://bugzilla.suse.com/1222803

https://bugzilla.suse.com/1225606

https://bugzilla.suse.com/1225742

https://bugzilla.suse.com/1225981

https://bugzilla.suse.com/1227937

https://bugzilla.suse.com/1228521

https://bugzilla.suse.com/1230235

https://bugzilla.suse.com/1230438

https://bugzilla.suse.com/1230439

https://bugzilla.suse.com/1230497

https://bugzilla.suse.com/1238368

https://bugzilla.suse.com/1238494

https://bugzilla.suse.com/1238496

https://bugzilla.suse.com/1238509

https://bugzilla.suse.com/1238521

https://bugzilla.suse.com/1238525

https://bugzilla.suse.com/1238570

https://bugzilla.suse.com/1238739

https://bugzilla.suse.com/1238751

https://bugzilla.suse.com/1238753

https://bugzilla.suse.com/1238759

https://bugzilla.suse.com/1238860

https://bugzilla.suse.com/1238863

https://bugzilla.suse.com/1238877

http://www.nessus.org/u?9867d361

https://www.suse.com/security/cve/CVE-2023-52924

https://www.suse.com/security/cve/CVE-2023-52925

https://www.suse.com/security/cve/CVE-2024-26708

https://www.suse.com/security/cve/CVE-2024-26810

https://www.suse.com/security/cve/CVE-2024-40980

https://www.suse.com/security/cve/CVE-2024-41055

https://www.suse.com/security/cve/CVE-2024-44974

https://www.suse.com/security/cve/CVE-2024-45009

https://www.suse.com/security/cve/CVE-2024-45010

https://www.suse.com/security/cve/CVE-2024-46858

https://www.suse.com/security/cve/CVE-2024-47701

https://www.suse.com/security/cve/CVE-2024-49884

https://www.suse.com/security/cve/CVE-2024-49950

https://www.suse.com/security/cve/CVE-2024-50029

https://www.suse.com/security/cve/CVE-2024-50036

https://www.suse.com/security/cve/CVE-2024-50073

https://www.suse.com/security/cve/CVE-2024-50085

https://www.suse.com/security/cve/CVE-2024-50115

https://www.suse.com/security/cve/CVE-2024-50142

https://www.suse.com/security/cve/CVE-2024-50185

https://www.suse.com/security/cve/CVE-2024-50294

https://www.suse.com/security/cve/CVE-2024-53123

https://www.suse.com/security/cve/CVE-2024-53147

https://www.suse.com/security/cve/CVE-2024-53173

https://www.suse.com/security/cve/CVE-2024-53176

https://www.suse.com/security/cve/CVE-2024-53177

https://www.suse.com/security/cve/CVE-2024-53178

https://www.suse.com/security/cve/CVE-2024-53226

https://www.suse.com/security/cve/CVE-2024-53239

https://www.suse.com/security/cve/CVE-2024-56539

https://www.suse.com/security/cve/CVE-2024-56548

https://www.suse.com/security/cve/CVE-2024-56568

https://www.suse.com/security/cve/CVE-2024-56579

https://www.suse.com/security/cve/CVE-2024-56592

https://www.suse.com/security/cve/CVE-2024-56605

https://www.suse.com/security/cve/CVE-2024-56633

https://www.suse.com/security/cve/CVE-2024-56647

https://www.suse.com/security/cve/CVE-2024-56658

https://www.suse.com/security/cve/CVE-2024-56720

https://www.suse.com/security/cve/CVE-2024-57882

https://www.suse.com/security/cve/CVE-2024-57889

https://www.suse.com/security/cve/CVE-2024-57948

https://www.suse.com/security/cve/CVE-2024-57979

https://www.suse.com/security/cve/CVE-2024-57994

https://www.suse.com/security/cve/CVE-2025-21636

https://bugzilla.suse.com/1231088

https://bugzilla.suse.com/1231432

https://bugzilla.suse.com/1231912

https://bugzilla.suse.com/1231920

https://bugzilla.suse.com/1231949

https://bugzilla.suse.com/1232159

https://bugzilla.suse.com/1232198

https://bugzilla.suse.com/1232201

https://bugzilla.suse.com/1232299

https://bugzilla.suse.com/1232508

https://bugzilla.suse.com/1232520

https://bugzilla.suse.com/1232919

https://bugzilla.suse.com/1233028

https://bugzilla.suse.com/1233109

https://bugzilla.suse.com/1233483

https://bugzilla.suse.com/1233749

https://bugzilla.suse.com/1234070

https://bugzilla.suse.com/1234853

https://bugzilla.suse.com/1234857

https://bugzilla.suse.com/1234891

https://bugzilla.suse.com/1234894

https://bugzilla.suse.com/1234895

https://bugzilla.suse.com/1234896

https://bugzilla.suse.com/1234963

https://bugzilla.suse.com/1235032

https://bugzilla.suse.com/1235054

https://bugzilla.suse.com/1235061

https://bugzilla.suse.com/1235073

https://bugzilla.suse.com/1235244

https://bugzilla.suse.com/1235435

https://bugzilla.suse.com/1235441

https://bugzilla.suse.com/1235485

https://bugzilla.suse.com/1235592

https://bugzilla.suse.com/1235599

https://bugzilla.suse.com/1235609

https://bugzilla.suse.com/1235914

https://bugzilla.suse.com/1235932

https://bugzilla.suse.com/1235933

https://bugzilla.suse.com/1236113

https://bugzilla.suse.com/1236114

https://bugzilla.suse.com/1236115

https://bugzilla.suse.com/1236122

https://bugzilla.suse.com/1236123

https://bugzilla.suse.com/1236133

https://bugzilla.suse.com/1236138

https://bugzilla.suse.com/1236199

https://bugzilla.suse.com/1236200

https://bugzilla.suse.com/1236203

https://bugzilla.suse.com/1236205

https://bugzilla.suse.com/1236573

https://bugzilla.suse.com/1236575

https://bugzilla.suse.com/1236576

https://bugzilla.suse.com/1236591

https://bugzilla.suse.com/1236661

https://bugzilla.suse.com/1236677

https://bugzilla.suse.com/1236680

https://bugzilla.suse.com/1236681

https://bugzilla.suse.com/1236682

https://bugzilla.suse.com/1236683

https://bugzilla.suse.com/1236684

https://bugzilla.suse.com/1236685

https://bugzilla.suse.com/1236689

https://bugzilla.suse.com/1236694

https://bugzilla.suse.com/1236700

https://bugzilla.suse.com/1236702

https://bugzilla.suse.com/1236752

https://bugzilla.suse.com/1236759

https://bugzilla.suse.com/1236761

https://bugzilla.suse.com/1236821

https://bugzilla.suse.com/1236822

https://bugzilla.suse.com/1236896

https://bugzilla.suse.com/1236897

https://bugzilla.suse.com/1236952

https://bugzilla.suse.com/1236967

https://bugzilla.suse.com/1236994

https://bugzilla.suse.com/1237007

https://bugzilla.suse.com/1237017

https://bugzilla.suse.com/1237025

https://bugzilla.suse.com/1237028

https://bugzilla.suse.com/1237045

https://bugzilla.suse.com/1237126

https://bugzilla.suse.com/1237132

https://bugzilla.suse.com/1237139

https://bugzilla.suse.com/1237155

https://bugzilla.suse.com/1237158

https://bugzilla.suse.com/1237159

https://bugzilla.suse.com/1237232

https://bugzilla.suse.com/1237234

https://bugzilla.suse.com/1237325

https://bugzilla.suse.com/1237356

https://bugzilla.suse.com/1237415

https://bugzilla.suse.com/1237452

https://bugzilla.suse.com/1237504

https://bugzilla.suse.com/1237521

https://bugzilla.suse.com/1237558

https://bugzilla.suse.com/1237562

https://bugzilla.suse.com/1237563

https://bugzilla.suse.com/1237848

https://bugzilla.suse.com/1237849

https://www.suse.com/security/cve/CVE-2025-21637

https://www.suse.com/security/cve/CVE-2025-21638

https://www.suse.com/security/cve/CVE-2025-21639

https://www.suse.com/security/cve/CVE-2025-21640

https://www.suse.com/security/cve/CVE-2025-21647

https://www.suse.com/security/cve/CVE-2025-21665

https://www.suse.com/security/cve/CVE-2025-21666

https://www.suse.com/security/cve/CVE-2025-21667

https://www.suse.com/security/cve/CVE-2025-21668

https://www.suse.com/security/cve/CVE-2025-21669

https://www.suse.com/security/cve/CVE-2025-21670

https://www.suse.com/security/cve/CVE-2025-21673

https://www.suse.com/security/cve/CVE-2025-21675

https://www.suse.com/security/cve/CVE-2025-21680

https://www.suse.com/security/cve/CVE-2025-21681

https://www.suse.com/security/cve/CVE-2025-21684

https://www.suse.com/security/cve/CVE-2025-21687

https://www.suse.com/security/cve/CVE-2025-21688

https://www.suse.com/security/cve/CVE-2025-21689

https://www.suse.com/security/cve/CVE-2025-21690

https://www.suse.com/security/cve/CVE-2025-21692

https://www.suse.com/security/cve/CVE-2025-21697

https://www.suse.com/security/cve/CVE-2025-21699

https://www.suse.com/security/cve/CVE-2025-21700

https://www.suse.com/security/cve/CVE-2025-21705

https://www.suse.com/security/cve/CVE-2025-21715

https://www.suse.com/security/cve/CVE-2025-21716

https://www.suse.com/security/cve/CVE-2025-21719

https://www.suse.com/security/cve/CVE-2025-21724

https://www.suse.com/security/cve/CVE-2025-21725

https://www.suse.com/security/cve/CVE-2025-21728

https://www.suse.com/security/cve/CVE-2025-21733

https://www.suse.com/security/cve/CVE-2025-21754

https://www.suse.com/security/cve/CVE-2025-21767

https://www.suse.com/security/cve/CVE-2025-21790

https://www.suse.com/security/cve/CVE-2025-21795

https://www.suse.com/security/cve/CVE-2025-21799

https://www.suse.com/security/cve/CVE-2025-21802

Plugin Details

Severity: High

ID: 232678

File Name: suse_SU-2025-0847-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/13/2025

Updated: 3/13/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-21692

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/12/2025

Vulnerability Publication Date: 4/3/2024

Reference Information

CVE: CVE-2023-52924, CVE-2023-52925, CVE-2024-26708, CVE-2024-26810, CVE-2024-40980, CVE-2024-41055, CVE-2024-44974, CVE-2024-45009, CVE-2024-45010, CVE-2024-46858, CVE-2024-47701, CVE-2024-49884, CVE-2024-49950, CVE-2024-50029, CVE-2024-50036, CVE-2024-50073, CVE-2024-50085, CVE-2024-50115, CVE-2024-50142, CVE-2024-50185, CVE-2024-50294, CVE-2024-53123, CVE-2024-53147, CVE-2024-53173, CVE-2024-53176, CVE-2024-53177, CVE-2024-53178, CVE-2024-53226, CVE-2024-53239, CVE-2024-56539, CVE-2024-56548, CVE-2024-56568, CVE-2024-56579, CVE-2024-56592, CVE-2024-56605, CVE-2024-56633, CVE-2024-56647, CVE-2024-56658, CVE-2024-56720, CVE-2024-57882, CVE-2024-57889, CVE-2024-57948, CVE-2024-57979, CVE-2024-57994, CVE-2025-21636, CVE-2025-21637, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21647, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669, CVE-2025-21670, CVE-2025-21673, CVE-2025-21675, CVE-2025-21680, CVE-2025-21681, CVE-2025-21684, CVE-2025-21687, CVE-2025-21688, CVE-2025-21689, CVE-2025-21690, CVE-2025-21692, CVE-2025-21697, CVE-2025-21699, CVE-2025-21700, CVE-2025-21705, CVE-2025-21715, CVE-2025-21716, CVE-2025-21719, CVE-2025-21724, CVE-2025-21725, CVE-2025-21728, CVE-2025-21733, CVE-2025-21754, CVE-2025-21767, CVE-2025-21790, CVE-2025-21795, CVE-2025-21799, CVE-2025-21802

SuSE: SUSE-SU-2025:0847-1