SUSE SLES15 : Recommended update for initial livepatch (SUSE-SU-2026:1563-1)

medium Nessus Plugin ID 310059

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1563-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).
- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-nelems before insertion (bsc#1260009).
- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).

The following non security issue was fixed:

- watchdog/perf: properly initialize the turbo mode timestamp and rearm counter (bsc#1256504).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1246057

https://bugzilla.suse.com/1256504

https://bugzilla.suse.com/1256675

https://bugzilla.suse.com/1257773

https://bugzilla.suse.com/1259797

https://bugzilla.suse.com/1260005

https://bugzilla.suse.com/1260009

https://lists.suse.com/pipermail/sle-updates/2026-April/045882.html

https://www.suse.com/security/cve/CVE-2025-38234

https://www.suse.com/security/cve/CVE-2025-68818

https://www.suse.com/security/cve/CVE-2026-23103

https://www.suse.com/security/cve/CVE-2026-23243

https://www.suse.com/security/cve/CVE-2026-23272

https://www.suse.com/security/cve/CVE-2026-23274

Plugin Details

Severity: Medium

ID: 310059

File Name: suse_SU-2026-1563-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 4/24/2026

Updated: 4/24/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2026-23103

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_200-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/23/2026

Vulnerability Publication Date: 5/28/2025

Reference Information

CVE: CVE-2025-38234, CVE-2025-68818, CVE-2026-23103, CVE-2026-23243, CVE-2026-23272, CVE-2026-23274

SuSE: SUSE-SU-2026:1563-1