SUSE SLES15 Security Update : kernel (SUSE-SU-2026:0962-1)

critical Nessus Plugin ID 303406

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0962-1 advisory.

The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).
- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).
- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).
- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).
- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).
- CVE-2025-68778: btrfs: don't log conflicting inode if it's a dir moved in the current transaction (bsc#1256683).
- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).
- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).
- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).
- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).
- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).
- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).
- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).
- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).
- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).
- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).
- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).
- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).
- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).
- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).
- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).
- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).
- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).
- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).
- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).
- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).
- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).
- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).
- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).
- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).
- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).
- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).
- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).
- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).
- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management
- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150700_7_34-rt package.

See Also

https://bugzilla.suse.com/1258249

https://bugzilla.suse.com/1258252

https://bugzilla.suse.com/1258256

https://bugzilla.suse.com/1258259

https://bugzilla.suse.com/1258272

https://bugzilla.suse.com/1258273

https://bugzilla.suse.com/1258277

https://bugzilla.suse.com/1258278

https://bugzilla.suse.com/1258279

https://bugzilla.suse.com/1258286

https://bugzilla.suse.com/1258293

https://bugzilla.suse.com/1258297

https://bugzilla.suse.com/1258298

https://bugzilla.suse.com/1258299

https://bugzilla.suse.com/1258304

https://bugzilla.suse.com/1258309

https://bugzilla.suse.com/1258313

https://bugzilla.suse.com/1258317

https://bugzilla.suse.com/1258321

https://bugzilla.suse.com/1258326

https://bugzilla.suse.com/1258338

https://bugzilla.suse.com/1258340

https://bugzilla.suse.com/1258349

https://bugzilla.suse.com/1258354

https://bugzilla.suse.com/1258358

https://bugzilla.suse.com/1258374

https://bugzilla.suse.com/1258376

https://bugzilla.suse.com/1258377

https://bugzilla.suse.com/1258379

https://bugzilla.suse.com/1258389

https://bugzilla.suse.com/1258394

https://bugzilla.suse.com/1258395

https://bugzilla.suse.com/1258397

https://bugzilla.suse.com/1258411

https://bugzilla.suse.com/1258415

https://bugzilla.suse.com/1258419

https://bugzilla.suse.com/1258422

https://bugzilla.suse.com/1258424

https://bugzilla.suse.com/1258429

https://bugzilla.suse.com/1258442

https://bugzilla.suse.com/1258464

https://bugzilla.suse.com/1258465

https://bugzilla.suse.com/1258468

https://bugzilla.suse.com/1258469

https://bugzilla.suse.com/1258484

https://bugzilla.suse.com/1258517

https://bugzilla.suse.com/1258518

https://bugzilla.suse.com/1258519

https://bugzilla.suse.com/1258520

https://bugzilla.suse.com/1258524

https://bugzilla.suse.com/1258544

https://bugzilla.suse.com/1258660

https://bugzilla.suse.com/1258824

https://bugzilla.suse.com/1258832

https://bugzilla.suse.com/1258849

https://bugzilla.suse.com/1258860

https://bugzilla.suse.com/1258928

https://bugzilla.suse.com/1259070

https://bugzilla.suse.com/1259130

https://bugzilla.suse.com/1259558

https://bugzilla.suse.com/1259580

http://www.nessus.org/u?c7afc01b

https://www.suse.com/security/cve/CVE-2023-53817

https://www.suse.com/security/cve/CVE-2025-39748

https://www.suse.com/security/cve/CVE-2025-39817

https://www.suse.com/security/cve/CVE-2025-39964

https://www.suse.com/security/cve/CVE-2025-40099

https://www.suse.com/security/cve/CVE-2025-40103

https://www.suse.com/security/cve/CVE-2025-40201

https://www.suse.com/security/cve/CVE-2025-40253

https://www.suse.com/security/cve/CVE-2025-68283

https://www.suse.com/security/cve/CVE-2025-68295

https://www.suse.com/security/cve/CVE-2025-68374

https://www.suse.com/security/cve/CVE-2025-68735

https://www.suse.com/security/cve/CVE-2025-68736

https://www.suse.com/security/cve/CVE-2025-68778

https://www.suse.com/security/cve/CVE-2025-68785

https://www.suse.com/security/cve/CVE-2025-68810

https://www.suse.com/security/cve/CVE-2025-71071

https://www.suse.com/security/cve/CVE-2025-71104

https://www.suse.com/security/cve/CVE-2025-71113

https://www.suse.com/security/cve/CVE-2025-71125

https://www.suse.com/security/cve/CVE-2025-71126

https://www.suse.com/security/cve/CVE-2025-71148

https://www.suse.com/security/cve/CVE-2025-71182

https://www.suse.com/security/cve/CVE-2025-71184

https://www.suse.com/security/cve/CVE-2025-71185

https://www.suse.com/security/cve/CVE-2025-71188

https://www.suse.com/security/cve/CVE-2025-71189

https://www.suse.com/security/cve/CVE-2025-71190

https://www.suse.com/security/cve/CVE-2025-71191

https://www.suse.com/security/cve/CVE-2025-71192

https://www.suse.com/security/cve/CVE-2025-71194

https://www.suse.com/security/cve/CVE-2025-71195

https://www.suse.com/security/cve/CVE-2025-71196

https://www.suse.com/security/cve/CVE-2025-71197

https://www.suse.com/security/cve/CVE-2025-71198

https://www.suse.com/security/cve/CVE-2025-71199

https://www.suse.com/security/cve/CVE-2025-71200

https://www.suse.com/security/cve/CVE-2025-71222

https://www.suse.com/security/cve/CVE-2025-71224

https://www.suse.com/security/cve/CVE-2025-71225

https://www.suse.com/security/cve/CVE-2025-71229

https://www.suse.com/security/cve/CVE-2025-71231

https://www.suse.com/security/cve/CVE-2025-71232

https://www.suse.com/security/cve/CVE-2025-71234

https://www.suse.com/security/cve/CVE-2025-71235

https://www.suse.com/security/cve/CVE-2025-71236

https://www.suse.com/security/cve/CVE-2026-22979

https://www.suse.com/security/cve/CVE-2026-22982

https://www.suse.com/security/cve/CVE-2026-22989

https://www.suse.com/security/cve/CVE-2026-22998

https://www.suse.com/security/cve/CVE-2026-23003

https://www.suse.com/security/cve/CVE-2026-23004

https://www.suse.com/security/cve/CVE-2026-23010

https://www.suse.com/security/cve/CVE-2026-23017

https://www.suse.com/security/cve/CVE-2026-23021

https://www.suse.com/security/cve/CVE-2026-23023

https://www.suse.com/security/cve/CVE-2026-23026

https://www.suse.com/security/cve/CVE-2026-23033

https://www.suse.com/security/cve/CVE-2026-23035

https://www.suse.com/security/cve/CVE-2026-23037

https://www.suse.com/security/cve/CVE-2026-23038

https://www.suse.com/security/cve/CVE-2026-23049

https://www.suse.com/security/cve/CVE-2026-23053

https://www.suse.com/security/cve/CVE-2026-23054

https://www.suse.com/security/cve/CVE-2026-23056

https://www.suse.com/security/cve/CVE-2026-23057

https://www.suse.com/security/cve/CVE-2026-23058

https://www.suse.com/security/cve/CVE-2026-23060

https://www.suse.com/security/cve/CVE-2026-23061

https://www.suse.com/security/cve/CVE-2026-23062

https://www.suse.com/security/cve/CVE-2026-23063

https://www.suse.com/security/cve/CVE-2026-23064

https://www.suse.com/security/cve/CVE-2026-23065

https://www.suse.com/security/cve/CVE-2026-23068

https://www.suse.com/security/cve/CVE-2026-23069

https://www.suse.com/security/cve/CVE-2026-23070

https://www.suse.com/security/cve/CVE-2026-23071

https://www.suse.com/security/cve/CVE-2026-23073

https://www.suse.com/security/cve/CVE-2026-23074

https://www.suse.com/security/cve/CVE-2026-23076

https://www.suse.com/security/cve/CVE-2026-23078

https://www.suse.com/security/cve/CVE-2026-23080

https://www.suse.com/security/cve/CVE-2026-23082

https://www.suse.com/security/cve/CVE-2026-23083

https://www.suse.com/security/cve/CVE-2026-23084

https://www.suse.com/security/cve/CVE-2026-23085

https://www.suse.com/security/cve/CVE-2026-23086

https://www.suse.com/security/cve/CVE-2026-23088

https://www.suse.com/security/cve/CVE-2026-23089

https://www.suse.com/security/cve/CVE-2026-23090

https://www.suse.com/security/cve/CVE-2026-23091

https://www.suse.com/security/cve/CVE-2026-23094

https://www.suse.com/security/cve/CVE-2026-23095

https://www.suse.com/security/cve/CVE-2026-23096

https://www.suse.com/security/cve/CVE-2026-23099

https://www.suse.com/security/cve/CVE-2026-23101

https://www.suse.com/security/cve/CVE-2026-23102

https://www.suse.com/security/cve/CVE-2026-23104

https://www.suse.com/security/cve/CVE-2026-23105

https://www.suse.com/security/cve/CVE-2026-23107

https://www.suse.com/security/cve/CVE-2026-23108

https://www.suse.com/security/cve/CVE-2026-23110

https://www.suse.com/security/cve/CVE-2026-23111

https://www.suse.com/security/cve/CVE-2026-23112

https://www.suse.com/security/cve/CVE-2026-23113

https://www.suse.com/security/cve/CVE-2026-23116

https://www.suse.com/security/cve/CVE-2026-23119

https://www.suse.com/security/cve/CVE-2026-23121

https://www.suse.com/security/cve/CVE-2026-23125

https://www.suse.com/security/cve/CVE-2026-23128

https://www.suse.com/security/cve/CVE-2026-23129

https://www.suse.com/security/cve/CVE-2026-23131

https://www.suse.com/security/cve/CVE-2026-23133

https://www.suse.com/security/cve/CVE-2026-23135

https://www.suse.com/security/cve/CVE-2026-23139

https://www.suse.com/security/cve/CVE-2026-23141

https://www.suse.com/security/cve/CVE-2026-23145

https://www.suse.com/security/cve/CVE-2026-23146

https://www.suse.com/security/cve/CVE-2026-23150

https://www.suse.com/security/cve/CVE-2026-23151

https://www.suse.com/security/cve/CVE-2026-23152

https://www.suse.com/security/cve/CVE-2026-23154

https://www.suse.com/security/cve/CVE-2026-23155

https://www.suse.com/security/cve/CVE-2026-23156

https://www.suse.com/security/cve/CVE-2026-23157

https://www.suse.com/security/cve/CVE-2026-23163

https://www.suse.com/security/cve/CVE-2026-23166

https://www.suse.com/security/cve/CVE-2026-23167

https://www.suse.com/security/cve/CVE-2026-23169

https://www.suse.com/security/cve/CVE-2026-23170

https://www.suse.com/security/cve/CVE-2026-23171

https://www.suse.com/security/cve/CVE-2026-23172

https://www.suse.com/security/cve/CVE-2026-23173

https://www.suse.com/security/cve/CVE-2026-23176

https://www.suse.com/security/cve/CVE-2026-23178

https://www.suse.com/security/cve/CVE-2026-23179

https://www.suse.com/security/cve/CVE-2026-23182

https://www.suse.com/security/cve/CVE-2026-23190

https://www.suse.com/security/cve/CVE-2026-23191

https://www.suse.com/security/cve/CVE-2026-23198

https://www.suse.com/security/cve/CVE-2026-23202

https://www.suse.com/security/cve/CVE-2026-23204

https://www.suse.com/security/cve/CVE-2026-23207

https://www.suse.com/security/cve/CVE-2026-23208

https://www.suse.com/security/cve/CVE-2026-23209

https://www.suse.com/security/cve/CVE-2026-23210

https://www.suse.com/security/cve/CVE-2026-23213

https://www.suse.com/security/cve/CVE-2026-23214

https://www.suse.com/security/cve/CVE-2026-23221

https://www.suse.com/security/cve/CVE-2026-23222

https://www.suse.com/security/cve/CVE-2026-23229

https://www.suse.com/security/cve/CVE-2026-23268

https://www.suse.com/security/cve/CVE-2026-23269

https://bugzilla.suse.com/1241345

https://bugzilla.suse.com/1245728

https://bugzilla.suse.com/1247180

https://bugzilla.suse.com/1249587

https://bugzilla.suse.com/1249998

https://bugzilla.suse.com/1251135

https://bugzilla.suse.com/1251186

https://bugzilla.suse.com/1251966

https://bugzilla.suse.com/1251971

https://bugzilla.suse.com/1252008

https://bugzilla.suse.com/1252266

https://bugzilla.suse.com/1252911

https://bugzilla.suse.com/1252924

https://bugzilla.suse.com/1253049

https://bugzilla.suse.com/1253129

https://bugzilla.suse.com/1253644

https://bugzilla.suse.com/1253691

https://bugzilla.suse.com/1254214

https://bugzilla.suse.com/1254306

https://bugzilla.suse.com/1254992

https://bugzilla.suse.com/1255084

https://bugzilla.suse.com/1255129

https://bugzilla.suse.com/1255265

https://bugzilla.suse.com/1255379

https://bugzilla.suse.com/1255530

https://bugzilla.suse.com/1255698

https://bugzilla.suse.com/1255811

https://bugzilla.suse.com/1256564

https://bugzilla.suse.com/1256640

https://bugzilla.suse.com/1256679

https://bugzilla.suse.com/1256683

https://bugzilla.suse.com/1256708

https://bugzilla.suse.com/1256716

https://bugzilla.suse.com/1256755

https://bugzilla.suse.com/1256784

https://bugzilla.suse.com/1256802

https://bugzilla.suse.com/1256863

https://bugzilla.suse.com/1257159

https://bugzilla.suse.com/1257179

https://bugzilla.suse.com/1257209

https://bugzilla.suse.com/1257228

https://bugzilla.suse.com/1257231

https://bugzilla.suse.com/1257246

https://bugzilla.suse.com/1257279

https://bugzilla.suse.com/1257332

https://bugzilla.suse.com/1257466

https://bugzilla.suse.com/1257472

https://bugzilla.suse.com/1257473

https://bugzilla.suse.com/1257552

https://bugzilla.suse.com/1257553

https://bugzilla.suse.com/1257554

https://bugzilla.suse.com/1257556

https://bugzilla.suse.com/1257557

https://bugzilla.suse.com/1257559

https://bugzilla.suse.com/1257560

https://bugzilla.suse.com/1257562

https://bugzilla.suse.com/1257570

https://bugzilla.suse.com/1257573

https://bugzilla.suse.com/1257576

https://bugzilla.suse.com/1257579

https://bugzilla.suse.com/1257580

https://bugzilla.suse.com/1257586

https://bugzilla.suse.com/1257635

https://bugzilla.suse.com/1257679

https://bugzilla.suse.com/1257687

https://bugzilla.suse.com/1257704

https://bugzilla.suse.com/1257706

https://bugzilla.suse.com/1257707

https://bugzilla.suse.com/1257709

https://bugzilla.suse.com/1257714

https://bugzilla.suse.com/1257715

https://bugzilla.suse.com/1257716

https://bugzilla.suse.com/1257718

https://bugzilla.suse.com/1257722

https://bugzilla.suse.com/1257723

https://bugzilla.suse.com/1257729

https://bugzilla.suse.com/1257732

https://bugzilla.suse.com/1257734

https://bugzilla.suse.com/1257735

https://bugzilla.suse.com/1257739

https://bugzilla.suse.com/1257740

https://bugzilla.suse.com/1257741

https://bugzilla.suse.com/1257742

https://bugzilla.suse.com/1257743

https://bugzilla.suse.com/1257745

https://bugzilla.suse.com/1257749

https://bugzilla.suse.com/1257750

https://bugzilla.suse.com/1257755

https://bugzilla.suse.com/1257757

https://bugzilla.suse.com/1257758

https://bugzilla.suse.com/1257759

https://bugzilla.suse.com/1257761

https://bugzilla.suse.com/1257762

https://bugzilla.suse.com/1257763

https://bugzilla.suse.com/1257765

https://bugzilla.suse.com/1257768

https://bugzilla.suse.com/1257770

https://bugzilla.suse.com/1257772

https://bugzilla.suse.com/1257775

https://bugzilla.suse.com/1257776

https://bugzilla.suse.com/1257788

https://bugzilla.suse.com/1257789

https://bugzilla.suse.com/1257790

https://bugzilla.suse.com/1257805

https://bugzilla.suse.com/1257808

https://bugzilla.suse.com/1257809

https://bugzilla.suse.com/1257811

https://bugzilla.suse.com/1257813

https://bugzilla.suse.com/1257814

https://bugzilla.suse.com/1257816

https://bugzilla.suse.com/1257830

https://bugzilla.suse.com/1257891

https://bugzilla.suse.com/1257952

https://bugzilla.suse.com/1258037

https://bugzilla.suse.com/1258153

https://bugzilla.suse.com/1258176

https://bugzilla.suse.com/1258181

https://bugzilla.suse.com/1258184

https://bugzilla.suse.com/1258222

https://bugzilla.suse.com/1258226

https://bugzilla.suse.com/1258234

https://bugzilla.suse.com/1258237

https://bugzilla.suse.com/1258245

Plugin Details

Severity: Critical

ID: 303406

File Name: suse_SU-2026-0962-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/24/2026

Updated: 3/24/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23112

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150700_7_34-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2026

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2023-53817, CVE-2025-39748, CVE-2025-39817, CVE-2025-39964, CVE-2025-40099, CVE-2025-40103, CVE-2025-40201, CVE-2025-40253, CVE-2025-68283, CVE-2025-68295, CVE-2025-68374, CVE-2025-68735, CVE-2025-68736, CVE-2025-68778, CVE-2025-68785, CVE-2025-68810, CVE-2025-71071, CVE-2025-71104, CVE-2025-71113, CVE-2025-71125, CVE-2025-71126, CVE-2025-71148, CVE-2025-71182, CVE-2025-71184, CVE-2025-71185, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190, CVE-2025-71191, CVE-2025-71192, CVE-2025-71194, CVE-2025-71195, CVE-2025-71196, CVE-2025-71197, CVE-2025-71198, CVE-2025-71199, CVE-2025-71200, CVE-2025-71222, CVE-2025-71224, CVE-2025-71225, CVE-2025-71229, CVE-2025-71231, CVE-2025-71232, CVE-2025-71234, CVE-2025-71235, CVE-2025-71236, CVE-2026-22979, CVE-2026-22982, CVE-2026-22989, CVE-2026-22998, CVE-2026-23003, CVE-2026-23004, CVE-2026-23010, CVE-2026-23017, CVE-2026-23021, CVE-2026-23023, CVE-2026-23026, CVE-2026-23033, CVE-2026-23035, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23053, CVE-2026-23054, CVE-2026-23056, CVE-2026-23057, CVE-2026-23058, CVE-2026-23060, CVE-2026-23061, CVE-2026-23062, CVE-2026-23063, CVE-2026-23064, CVE-2026-23065, CVE-2026-23068, CVE-2026-23069, CVE-2026-23070, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23082, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23088, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23094, CVE-2026-23095, CVE-2026-23096, CVE-2026-23099, CVE-2026-23101, CVE-2026-23102, CVE-2026-23104, CVE-2026-23105, CVE-2026-23107, CVE-2026-23108, CVE-2026-23110, CVE-2026-23111, CVE-2026-23112, CVE-2026-23113, CVE-2026-23116, CVE-2026-23119, CVE-2026-23121, CVE-2026-23125, CVE-2026-23128, CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23135, CVE-2026-23139, CVE-2026-23141, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23151, CVE-2026-23152, CVE-2026-23154, CVE-2026-23155, CVE-2026-23156, CVE-2026-23157, CVE-2026-23163, CVE-2026-23166, CVE-2026-23167, CVE-2026-23169, CVE-2026-23170, CVE-2026-23171, CVE-2026-23172, CVE-2026-23173, CVE-2026-23176, CVE-2026-23178, CVE-2026-23179, CVE-2026-23182, CVE-2026-23190, CVE-2026-23191, CVE-2026-23198, CVE-2026-23202, CVE-2026-23204, CVE-2026-23207, CVE-2026-23208, CVE-2026-23209, CVE-2026-23210, CVE-2026-23213, CVE-2026-23214, CVE-2026-23221, CVE-2026-23222, CVE-2026-23229, CVE-2026-23268, CVE-2026-23269

SuSE: SUSE-SU-2026:0962-1