SUSE SLES15 Security Update : kernel (SUSE-SU-2026:1573-1)

high Nessus Plugin ID 310061

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1573-1 advisory.

The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).
- CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647).
- CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865).
- CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889).
- CVE-2026-23030: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() (bsc#1257561).
- CVE-2026-23047: libceph: make calc_target() set t->paused, not just clear it (bsc#1257682).
- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).
- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).
- CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305).
- CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains (bsc#1258330).
- CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414).
- CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337).
- CVE-2026-23215: x86/vmware: Fix hypercall clobbers (bsc#1258476).
- CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447).
- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).
- CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795).
- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).
- CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#1259891).
- CVE-2026-23259: io_uring/rw: free potentially allocated iovec on cache put failure (bsc#1259866).
- CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886).
- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems before insertion (bsc#1260009).
- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).
- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).
- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).
- CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464).
- CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file() (bsc#1260500).
- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).
- CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (bsc#1260562).
- CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735).
- CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732).
- CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc#1260481).
- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).
- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).
- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).
- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).
- CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#1261496).
- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150700_7_37-rt package.

See Also

https://bugzilla.suse.com/1256647

https://bugzilla.suse.com/1256690

https://bugzilla.suse.com/1257466

https://bugzilla.suse.com/1257472

https://bugzilla.suse.com/1257506

https://bugzilla.suse.com/1257561

https://bugzilla.suse.com/1257682

https://bugzilla.suse.com/1257773

https://bugzilla.suse.com/1257777

https://bugzilla.suse.com/1258280

https://bugzilla.suse.com/1258303

https://bugzilla.suse.com/1258305

https://bugzilla.suse.com/1258330

https://bugzilla.suse.com/1258337

https://bugzilla.suse.com/1258414

https://bugzilla.suse.com/1258424

https://bugzilla.suse.com/1258447

https://bugzilla.suse.com/1258476

https://bugzilla.suse.com/1259188

https://bugzilla.suse.com/1259580

https://bugzilla.suse.com/1259707

https://bugzilla.suse.com/1259795

https://bugzilla.suse.com/1259797

https://bugzilla.suse.com/1259865

https://bugzilla.suse.com/1259866

https://bugzilla.suse.com/1259886

https://bugzilla.suse.com/1259889

https://bugzilla.suse.com/1259891

https://bugzilla.suse.com/1259997

https://bugzilla.suse.com/1259998

https://bugzilla.suse.com/1260005

https://bugzilla.suse.com/1260009

https://bugzilla.suse.com/1260347

https://bugzilla.suse.com/1260464

https://bugzilla.suse.com/1260471

https://bugzilla.suse.com/1260481

https://bugzilla.suse.com/1260486

https://bugzilla.suse.com/1260500

https://bugzilla.suse.com/1260562

https://bugzilla.suse.com/1260730

https://bugzilla.suse.com/1260732

https://bugzilla.suse.com/1260735

https://bugzilla.suse.com/1260799

https://bugzilla.suse.com/1261496

https://bugzilla.suse.com/1261498

https://lists.suse.com/pipermail/sle-updates/2026-April/045912.html

https://www.suse.com/security/cve/CVE-2024-38542

https://www.suse.com/security/cve/CVE-2025-39998

https://www.suse.com/security/cve/CVE-2025-68794

https://www.suse.com/security/cve/CVE-2025-71231

https://www.suse.com/security/cve/CVE-2025-71268

https://www.suse.com/security/cve/CVE-2025-71269

https://www.suse.com/security/cve/CVE-2026-23030

https://www.suse.com/security/cve/CVE-2026-23047

https://www.suse.com/security/cve/CVE-2026-23103

https://www.suse.com/security/cve/CVE-2026-23120

https://www.suse.com/security/cve/CVE-2026-23136

https://www.suse.com/security/cve/CVE-2026-23140

https://www.suse.com/security/cve/CVE-2026-23187

https://www.suse.com/security/cve/CVE-2026-23193

https://www.suse.com/security/cve/CVE-2026-23201

https://www.suse.com/security/cve/CVE-2026-23215

https://www.suse.com/security/cve/CVE-2026-23216

https://www.suse.com/security/cve/CVE-2026-23231

https://www.suse.com/security/cve/CVE-2026-23242

https://www.suse.com/security/cve/CVE-2026-23243

https://www.suse.com/security/cve/CVE-2026-23255

https://www.suse.com/security/cve/CVE-2026-23259

https://www.suse.com/security/cve/CVE-2026-23270

https://www.suse.com/security/cve/CVE-2026-23272

https://www.suse.com/security/cve/CVE-2026-23274

https://www.suse.com/security/cve/CVE-2026-23277

https://www.suse.com/security/cve/CVE-2026-23278

https://www.suse.com/security/cve/CVE-2026-23281

https://www.suse.com/security/cve/CVE-2026-23292

https://www.suse.com/security/cve/CVE-2026-23293

https://www.suse.com/security/cve/CVE-2026-23317

https://www.suse.com/security/cve/CVE-2026-23319

https://www.suse.com/security/cve/CVE-2026-23361

https://www.suse.com/security/cve/CVE-2026-23379

https://www.suse.com/security/cve/CVE-2026-23381

https://www.suse.com/security/cve/CVE-2026-23386

https://www.suse.com/security/cve/CVE-2026-23398

https://www.suse.com/security/cve/CVE-2026-23413

https://www.suse.com/security/cve/CVE-2026-23414

https://www.suse.com/security/cve/CVE-2026-31788

https://bugzilla.suse.com/1226591

https://bugzilla.suse.com/1243208

https://bugzilla.suse.com/1245728

https://bugzilla.suse.com/1251135

https://bugzilla.suse.com/1251971

https://bugzilla.suse.com/1252073

https://bugzilla.suse.com/1252266

https://bugzilla.suse.com/1252803

https://bugzilla.suse.com/1253049

https://bugzilla.suse.com/1253129

https://bugzilla.suse.com/1255687

https://bugzilla.suse.com/1256504

Plugin Details

Severity: High

ID: 310061

File Name: suse_SU-2026-1573-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 4/24/2026

Updated: 4/24/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23319

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150700_7_37-rt

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/23/2026

Vulnerability Publication Date: 6/19/2024

Reference Information

CVE: CVE-2024-38542, CVE-2025-39998, CVE-2025-68794, CVE-2025-71231, CVE-2025-71268, CVE-2025-71269, CVE-2026-23030, CVE-2026-23047, CVE-2026-23103, CVE-2026-23120, CVE-2026-23136, CVE-2026-23140, CVE-2026-23187, CVE-2026-23193, CVE-2026-23201, CVE-2026-23215, CVE-2026-23216, CVE-2026-23231, CVE-2026-23242, CVE-2026-23243, CVE-2026-23255, CVE-2026-23259, CVE-2026-23270, CVE-2026-23272, CVE-2026-23274, CVE-2026-23277, CVE-2026-23278, CVE-2026-23281, CVE-2026-23292, CVE-2026-23293, CVE-2026-23317, CVE-2026-23319, CVE-2026-23361, CVE-2026-23379, CVE-2026-23381, CVE-2026-23386, CVE-2026-23398, CVE-2026-23413, CVE-2026-23414, CVE-2026-31788

SuSE: SUSE-SU-2026:1573-1