SUSE SLES15 : Recommended update for initial livepatch (SUSE-SU-2026:0474-1)

high Nessus Plugin ID 298928

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0474-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).
- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).
- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).
- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).
- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).
- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation (bsc#1247483).
- CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr (bsc#1255251).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).

The following non security issues were fixed:

- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1253087).
- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).
- net: tcp: allow zero-window ACK update the window (bsc#1254767).
- net: tcp: send zero-window ACK when no memory (bsc#1254767).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- tcp: correct handling of extreme memory squeeze (bsc#1254767).
- x86: make page fault handling disable interrupts properly (git-fixes).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1220137

https://bugzilla.suse.com/1220144

https://bugzilla.suse.com/1222323

https://bugzilla.suse.com/1223007

https://bugzilla.suse.com/1225049

https://bugzilla.suse.com/1233038

https://bugzilla.suse.com/1235905

https://bugzilla.suse.com/1236104

https://bugzilla.suse.com/1236208

https://bugzilla.suse.com/1237885

https://bugzilla.suse.com/1237906

https://bugzilla.suse.com/1238414

https://bugzilla.suse.com/1238754

https://bugzilla.suse.com/1238763

https://bugzilla.suse.com/1244758

https://bugzilla.suse.com/1244904

https://bugzilla.suse.com/1245110

https://bugzilla.suse.com/1245210

https://bugzilla.suse.com/1245723

https://bugzilla.suse.com/1245751

https://bugzilla.suse.com/1247177

https://bugzilla.suse.com/1247483

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248377

https://bugzilla.suse.com/1249156

https://bugzilla.suse.com/1249158

https://bugzilla.suse.com/1249827

https://bugzilla.suse.com/1252785

https://bugzilla.suse.com/1253028

https://bugzilla.suse.com/1253087

https://bugzilla.suse.com/1253409

https://bugzilla.suse.com/1253702

https://bugzilla.suse.com/1254447

https://bugzilla.suse.com/1254462

https://bugzilla.suse.com/1254463

https://bugzilla.suse.com/1254464

https://bugzilla.suse.com/1254465

https://bugzilla.suse.com/1254767

https://bugzilla.suse.com/1254842

https://bugzilla.suse.com/1255171

https://bugzilla.suse.com/1255251

https://bugzilla.suse.com/1255377

https://bugzilla.suse.com/1255401

https://bugzilla.suse.com/1255594

https://bugzilla.suse.com/1255908

https://bugzilla.suse.com/1256095

https://bugzilla.suse.com/1256582

https://bugzilla.suse.com/1256612

https://bugzilla.suse.com/1256623

https://bugzilla.suse.com/1256641

https://bugzilla.suse.com/1256726

https://bugzilla.suse.com/1256744

https://bugzilla.suse.com/1256779

https://bugzilla.suse.com/1256792

https://bugzilla.suse.com/1257232

https://bugzilla.suse.com/1257236

https://bugzilla.suse.com/1257296

https://bugzilla.suse.com/1257473

http://www.nessus.org/u?433a362c

https://www.suse.com/security/cve/CVE-2022-49604

https://www.suse.com/security/cve/CVE-2022-49943

https://www.suse.com/security/cve/CVE-2022-49980

https://www.suse.com/security/cve/CVE-2022-50232

https://www.suse.com/security/cve/CVE-2022-50697

https://www.suse.com/security/cve/CVE-2023-52433

https://www.suse.com/security/cve/CVE-2023-52874

https://www.suse.com/security/cve/CVE-2023-52923

https://www.suse.com/security/cve/CVE-2023-53178

https://www.suse.com/security/cve/CVE-2023-53407

https://www.suse.com/security/cve/CVE-2023-53412

https://www.suse.com/security/cve/CVE-2023-53417

https://www.suse.com/security/cve/CVE-2023-53418

https://www.suse.com/security/cve/CVE-2023-53714

https://www.suse.com/security/cve/CVE-2023-54142

https://www.suse.com/security/cve/CVE-2023-54243

https://www.suse.com/security/cve/CVE-2024-26581

https://www.suse.com/security/cve/CVE-2024-26661

https://www.suse.com/security/cve/CVE-2024-26832

https://www.suse.com/security/cve/CVE-2024-50143

https://www.suse.com/security/cve/CVE-2024-54031

https://www.suse.com/security/cve/CVE-2025-21658

https://www.suse.com/security/cve/CVE-2025-21760

https://www.suse.com/security/cve/CVE-2025-21764

https://www.suse.com/security/cve/CVE-2025-21765

https://www.suse.com/security/cve/CVE-2025-21766

https://www.suse.com/security/cve/CVE-2025-38068

https://www.suse.com/security/cve/CVE-2025-38129

https://www.suse.com/security/cve/CVE-2025-38159

https://www.suse.com/security/cve/CVE-2025-38375

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38565

https://www.suse.com/security/cve/CVE-2025-38684

https://www.suse.com/security/cve/CVE-2025-40044

https://www.suse.com/security/cve/CVE-2025-40139

https://www.suse.com/security/cve/CVE-2025-40257

https://www.suse.com/security/cve/CVE-2025-40300

https://www.suse.com/security/cve/CVE-2025-68183

https://www.suse.com/security/cve/CVE-2025-68284

https://www.suse.com/security/cve/CVE-2025-68285

https://www.suse.com/security/cve/CVE-2025-68312

https://www.suse.com/security/cve/CVE-2025-68771

https://www.suse.com/security/cve/CVE-2025-68813

https://www.suse.com/security/cve/CVE-2025-71085

https://www.suse.com/security/cve/CVE-2025-71089

https://www.suse.com/security/cve/CVE-2025-71112

https://www.suse.com/security/cve/CVE-2025-71116

https://www.suse.com/security/cve/CVE-2025-71120

https://www.suse.com/security/cve/CVE-2026-22999

https://www.suse.com/security/cve/CVE-2026-23001

Plugin Details

Severity: High

ID: 298928

File Name: suse_SU-2026-0474-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/13/2026

Updated: 2/13/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38565

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_136-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/12/2026

Vulnerability Publication Date: 9/12/2022

Reference Information

CVE: CVE-2022-49604, CVE-2022-49943, CVE-2022-49980, CVE-2022-50232, CVE-2022-50697, CVE-2023-52433, CVE-2023-52874, CVE-2023-52923, CVE-2023-53178, CVE-2023-53407, CVE-2023-53412, CVE-2023-53417, CVE-2023-53418, CVE-2023-53714, CVE-2023-54142, CVE-2023-54243, CVE-2024-26581, CVE-2024-26661, CVE-2024-26832, CVE-2024-50143, CVE-2024-54031, CVE-2025-21658, CVE-2025-21760, CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-38068, CVE-2025-38129, CVE-2025-38159, CVE-2025-38375, CVE-2025-38563, CVE-2025-38565, CVE-2025-38684, CVE-2025-40044, CVE-2025-40139, CVE-2025-40257, CVE-2025-40300, CVE-2025-68183, CVE-2025-68284, CVE-2025-68285, CVE-2025-68312, CVE-2025-68771, CVE-2025-68813, CVE-2025-71085, CVE-2025-71089, CVE-2025-71112, CVE-2025-71116, CVE-2025-71120, CVE-2026-22999, CVE-2026-23001

SuSE: SUSE-SU-2026:0474-1