SUSE SLES12 : Recommended update for initial livepatch (SUSE-SU-2026:1668-1)

high Nessus Plugin ID 311740

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1668-1 advisory.

The SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2024-26584: net/tls: return ENOTSUPP on tls_init() (bsc#1220186).
- CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
- CVE-2025-39759: btrfs: qgroup: fix race between quota disable and quota rescan ioctl (bsc#1249522).
- CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865).
- CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889).
- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).
- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).
- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).
- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).
- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-nelems before insertion (bsc#1260009).
- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).
- CVE-2026-23318: ALSA: usb-audio: Use correct version for UAC3 header validation (bsc#1260536).
- CVE-2026-23362: can: bcm: fix locking for bcm_op runtime updates (bsc#1260489).
- CVE-2026-23382: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (bsc#1260551).
- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).
- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).

The following non security issues were fixed:

- btrfs: fix processing of delayed data refs during backref walking (bsc#1228031).
- fs: skip superblock shrink on frozen xfs filesystems (bsc#1259770).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1228031

https://bugzilla.suse.com/1246057

https://bugzilla.suse.com/1249522

https://bugzilla.suse.com/1257221

https://bugzilla.suse.com/1257773

https://bugzilla.suse.com/1258280

https://bugzilla.suse.com/1259770

https://bugzilla.suse.com/1259797

https://bugzilla.suse.com/1259865

https://bugzilla.suse.com/1259870

https://bugzilla.suse.com/1259889

https://bugzilla.suse.com/1259997

https://bugzilla.suse.com/1260009

https://www.suse.com/security/cve/CVE-2026-23243

https://www.suse.com/security/cve/CVE-2026-23262

https://www.suse.com/security/cve/CVE-2026-23272

https://www.suse.com/security/cve/CVE-2026-23277

https://www.suse.com/security/cve/CVE-2026-23318

https://www.suse.com/security/cve/CVE-2026-23362

https://www.suse.com/security/cve/CVE-2026-23382

https://www.suse.com/security/cve/CVE-2026-23386

https://www.suse.com/security/cve/CVE-2026-23398

https://bugzilla.suse.com/1260489

https://bugzilla.suse.com/1260536

https://bugzilla.suse.com/1260551

https://bugzilla.suse.com/1260730

https://bugzilla.suse.com/1260799

https://lists.suse.com/pipermail/sle-updates/2026-May/046145.html

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2025-38234

https://www.suse.com/security/cve/CVE-2025-39759

https://www.suse.com/security/cve/CVE-2025-71268

https://www.suse.com/security/cve/CVE-2025-71269

https://www.suse.com/security/cve/CVE-2026-22990

https://www.suse.com/security/cve/CVE-2026-23103

https://www.suse.com/security/cve/CVE-2026-23120

Plugin Details

Severity: High

ID: 311740

File Name: suse_SU-2026-1668-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/2/2026

Updated: 5/2/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C

CVSS Score Source: CVE-2026-23318

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_299-default, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:gfs2-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/1/2026

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2024-26584, CVE-2025-38234, CVE-2025-39759, CVE-2025-71268, CVE-2025-71269, CVE-2026-22990, CVE-2026-23103, CVE-2026-23120, CVE-2026-23243, CVE-2026-23262, CVE-2026-23272, CVE-2026-23277, CVE-2026-23318, CVE-2026-23362, CVE-2026-23382, CVE-2026-23386, CVE-2026-23398

SuSE: SUSE-SU-2026:1668-1