SUSE SLES15 : Recommended update for initial livepatch (SUSE-SU-2026:0984-1)

high Nessus Plugin ID 303574

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0984-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1238917

https://bugzilla.suse.com/1255075

https://bugzilla.suse.com/1256645

https://bugzilla.suse.com/1257231

https://bugzilla.suse.com/1257473

https://bugzilla.suse.com/1257732

https://bugzilla.suse.com/1257735

https://bugzilla.suse.com/1258340

https://bugzilla.suse.com/1258395

https://bugzilla.suse.com/1258518

https://bugzilla.suse.com/1258849

https://bugzilla.suse.com/1258850

https://bugzilla.suse.com/1259857

http://www.nessus.org/u?8be96653

https://www.suse.com/security/cve/CVE-2025-21738

https://www.suse.com/security/cve/CVE-2025-40242

https://www.suse.com/security/cve/CVE-2025-71066

https://www.suse.com/security/cve/CVE-2026-23004

https://www.suse.com/security/cve/CVE-2026-23054

https://www.suse.com/security/cve/CVE-2026-23060

https://www.suse.com/security/cve/CVE-2026-23191

https://www.suse.com/security/cve/CVE-2026-23204

https://www.suse.com/security/cve/CVE-2026-23209

https://www.suse.com/security/cve/CVE-2026-23268

https://www.suse.com/security/cve/CVE-2026-23269

Plugin Details

Severity: High

ID: 303574

File Name: suse_SU-2026-0984-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/25/2026

Updated: 3/25/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23209

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_197-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2026

Vulnerability Publication Date: 2/27/2025

Reference Information

CVE: CVE-2025-21738, CVE-2025-40242, CVE-2025-71066, CVE-2026-23004, CVE-2026-23054, CVE-2026-23060, CVE-2026-23191, CVE-2026-23204, CVE-2026-23209, CVE-2026-23268, CVE-2026-23269

SuSE: SUSE-SU-2026:0984-1