SUSE SLES12 : Recommended update for initial livepatch (SUSE-SU-2026:1078-1)

critical Nessus Plugin ID 303947

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1078-1 advisory.

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50453: gpiolib: cdev: fix NULL-pointer dereferences (bsc#1250887).
- CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255163).
- CVE-2023-53802: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (bsc#1254725).
- CVE-2023-53808: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (bsc#1254723).
- CVE-2023-53816: drm/amdkfd: fix potential kgd_mem UAFs (bsc#1254958).
- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).
- CVE-2023-53827: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (bsc#1255049).
- CVE-2023-54184: scsi: target: iscsit: Free cmds before session free (bsc#1255991).
- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2025-22083: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (bsc#1241414).
- CVE-2025-22125: md/raid1,raid10: do not ignore IO flags (bsc#1241596).
- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).
- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40342: nvme-fc: use lock accessing port_state and rport state (bsc#1255274).
- CVE-2025-68223: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (bsc#1255357).
- CVE-2025-68234: scsi: imm: Fix use-after-free bug caused by unfinished delayed work (bsc#1255416).
- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68287: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (bsc#1255152).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68724: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (bsc#1255550).
- CVE-2025-68818: scsi: qla2xxx: Perform lockless command completion in abort path (bsc#1256675).
- CVE-2025-71075: scsi: aic94xx: fix use-after-free in device removal path (bsc#1256629).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71131: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (bsc#1256742).
- CVE-2025-71183: btrfs: always detect conflicting inodes when logging inode refs (bsc#1257631).
- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).
- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).
- CVE-2025-71224: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (bsc#1258824).
- CVE-2025-71236: scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1258442).
- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23054: net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257732).
- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1215420

https://bugzilla.suse.com/1218752

https://bugzilla.suse.com/1238917

https://bugzilla.suse.com/1241414

https://bugzilla.suse.com/1241596

https://bugzilla.suse.com/1249587

https://bugzilla.suse.com/1249998

https://bugzilla.suse.com/1250887

https://bugzilla.suse.com/1251966

https://bugzilla.suse.com/1252073

https://bugzilla.suse.com/1252911

https://bugzilla.suse.com/1252924

https://bugzilla.suse.com/1254518

https://bugzilla.suse.com/1254520

https://bugzilla.suse.com/1254723

https://bugzilla.suse.com/1254725

https://bugzilla.suse.com/1254958

https://bugzilla.suse.com/1254992

https://bugzilla.suse.com/1255049

https://bugzilla.suse.com/1255075

https://bugzilla.suse.com/1255129

https://bugzilla.suse.com/1255152

https://bugzilla.suse.com/1255163

https://bugzilla.suse.com/1255274

https://bugzilla.suse.com/1255357

https://bugzilla.suse.com/1255379

https://bugzilla.suse.com/1255401

https://bugzilla.suse.com/1255416

https://bugzilla.suse.com/1255550

https://bugzilla.suse.com/1255991

https://bugzilla.suse.com/1256629

https://bugzilla.suse.com/1256675

https://bugzilla.suse.com/1256708

https://bugzilla.suse.com/1256716

https://bugzilla.suse.com/1256742

https://bugzilla.suse.com/1256744

https://bugzilla.suse.com/1257209

https://bugzilla.suse.com/1257220

https://bugzilla.suse.com/1257231

https://bugzilla.suse.com/1257246

https://bugzilla.suse.com/1257473

https://bugzilla.suse.com/1257631

https://bugzilla.suse.com/1257635

https://bugzilla.suse.com/1257672

https://bugzilla.suse.com/1257687

https://bugzilla.suse.com/1257732

https://bugzilla.suse.com/1257735

https://bugzilla.suse.com/1257745

https://bugzilla.suse.com/1257749

https://bugzilla.suse.com/1257755

https://bugzilla.suse.com/1257757

https://bugzilla.suse.com/1257758

https://bugzilla.suse.com/1257765

https://bugzilla.suse.com/1257775

https://bugzilla.suse.com/1257790

https://bugzilla.suse.com/1257808

https://bugzilla.suse.com/1257816

https://bugzilla.suse.com/1257830

https://bugzilla.suse.com/1257942

https://bugzilla.suse.com/1257949

https://bugzilla.suse.com/1258153

https://bugzilla.suse.com/1258184

https://bugzilla.suse.com/1258226

https://bugzilla.suse.com/1258293

https://bugzilla.suse.com/1258321

https://bugzilla.suse.com/1258340

https://bugzilla.suse.com/1258377

https://bugzilla.suse.com/1258395

https://bugzilla.suse.com/1258442

https://bugzilla.suse.com/1258468

https://bugzilla.suse.com/1258518

https://bugzilla.suse.com/1258824

https://bugzilla.suse.com/1258849

https://bugzilla.suse.com/1258850

https://bugzilla.suse.com/1259069

https://bugzilla.suse.com/1259857

http://www.nessus.org/u?19e85a7b

https://www.suse.com/security/cve/CVE-2022-50453

https://www.suse.com/security/cve/CVE-2023-53794

https://www.suse.com/security/cve/CVE-2023-53802

https://www.suse.com/security/cve/CVE-2023-53808

https://www.suse.com/security/cve/CVE-2023-53816

https://www.suse.com/security/cve/CVE-2023-53817

https://www.suse.com/security/cve/CVE-2023-53827

https://www.suse.com/security/cve/CVE-2023-54184

https://www.suse.com/security/cve/CVE-2023-6040

https://www.suse.com/security/cve/CVE-2025-21738

https://www.suse.com/security/cve/CVE-2025-22083

https://www.suse.com/security/cve/CVE-2025-22125

https://www.suse.com/security/cve/CVE-2025-39748

https://www.suse.com/security/cve/CVE-2025-39817

https://www.suse.com/security/cve/CVE-2025-39964

https://www.suse.com/security/cve/CVE-2025-39998

https://www.suse.com/security/cve/CVE-2025-40099

https://www.suse.com/security/cve/CVE-2025-40103

https://www.suse.com/security/cve/CVE-2025-40219

https://www.suse.com/security/cve/CVE-2025-40220

https://www.suse.com/security/cve/CVE-2025-40242

https://www.suse.com/security/cve/CVE-2025-40342

https://www.suse.com/security/cve/CVE-2025-68223

https://www.suse.com/security/cve/CVE-2025-68234

https://www.suse.com/security/cve/CVE-2025-68283

https://www.suse.com/security/cve/CVE-2025-68285

https://www.suse.com/security/cve/CVE-2025-68287

https://www.suse.com/security/cve/CVE-2025-68295

https://www.suse.com/security/cve/CVE-2025-68724

https://www.suse.com/security/cve/CVE-2025-68818

https://www.suse.com/security/cve/CVE-2025-71075

https://www.suse.com/security/cve/CVE-2025-71104

https://www.suse.com/security/cve/CVE-2025-71113

https://www.suse.com/security/cve/CVE-2025-71116

https://www.suse.com/security/cve/CVE-2025-71131

https://www.suse.com/security/cve/CVE-2025-71183

https://www.suse.com/security/cve/CVE-2025-71184

https://www.suse.com/security/cve/CVE-2025-71194

https://www.suse.com/security/cve/CVE-2025-71224

https://www.suse.com/security/cve/CVE-2025-71236

https://www.suse.com/security/cve/CVE-2026-22991

https://www.suse.com/security/cve/CVE-2026-22998

https://www.suse.com/security/cve/CVE-2026-23003

https://www.suse.com/security/cve/CVE-2026-23004

https://www.suse.com/security/cve/CVE-2026-23054

https://www.suse.com/security/cve/CVE-2026-23060

https://www.suse.com/security/cve/CVE-2026-23064

https://www.suse.com/security/cve/CVE-2026-23069

https://www.suse.com/security/cve/CVE-2026-23074

https://www.suse.com/security/cve/CVE-2026-23083

https://www.suse.com/security/cve/CVE-2026-23084

https://www.suse.com/security/cve/CVE-2026-23085

https://www.suse.com/security/cve/CVE-2026-23086

https://www.suse.com/security/cve/CVE-2026-23089

https://www.suse.com/security/cve/CVE-2026-23095

https://www.suse.com/security/cve/CVE-2026-23099

https://www.suse.com/security/cve/CVE-2026-23105

https://www.suse.com/security/cve/CVE-2026-23112

https://www.suse.com/security/cve/CVE-2026-23125

https://www.suse.com/security/cve/CVE-2026-23141

https://www.suse.com/security/cve/CVE-2026-23191

https://www.suse.com/security/cve/CVE-2026-23198

https://www.suse.com/security/cve/CVE-2026-23204

https://www.suse.com/security/cve/CVE-2026-23208

https://www.suse.com/security/cve/CVE-2026-23209

https://www.suse.com/security/cve/CVE-2026-23268

https://www.suse.com/security/cve/CVE-2026-23269

https://www.suse.com/security/cve/CVE-2026-25702

Plugin Details

Severity: Critical

ID: 303947

File Name: suse_SU-2026-1078-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/27/2026

Updated: 3/27/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-25702

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_296-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/26/2026

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2022-50453, CVE-2023-53794, CVE-2023-53802, CVE-2023-53808, CVE-2023-53816, CVE-2023-53817, CVE-2023-53827, CVE-2023-54184, CVE-2023-6040, CVE-2025-21738, CVE-2025-22083, CVE-2025-22125, CVE-2025-39748, CVE-2025-39817, CVE-2025-39964, CVE-2025-39998, CVE-2025-40099, CVE-2025-40103, CVE-2025-40219, CVE-2025-40220, CVE-2025-40242, CVE-2025-40342, CVE-2025-68223, CVE-2025-68234, CVE-2025-68283, CVE-2025-68285, CVE-2025-68287, CVE-2025-68295, CVE-2025-68724, CVE-2025-68818, CVE-2025-71075, CVE-2025-71104, CVE-2025-71113, CVE-2025-71116, CVE-2025-71131, CVE-2025-71183, CVE-2025-71184, CVE-2025-71194, CVE-2025-71224, CVE-2025-71236, CVE-2026-22991, CVE-2026-22998, CVE-2026-23003, CVE-2026-23004, CVE-2026-23054, CVE-2026-23060, CVE-2026-23064, CVE-2026-23069, CVE-2026-23074, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23089, CVE-2026-23095, CVE-2026-23099, CVE-2026-23105, CVE-2026-23112, CVE-2026-23125, CVE-2026-23141, CVE-2026-23191, CVE-2026-23198, CVE-2026-23204, CVE-2026-23208, CVE-2026-23209, CVE-2026-23268, CVE-2026-23269, CVE-2026-25702

SuSE: SUSE-SU-2026:1078-1