https://bugzilla.suse.com/1220186
https://bugzilla.suse.com/1228031
https://bugzilla.suse.com/1246057
https://bugzilla.suse.com/1249522
https://bugzilla.suse.com/1257221
https://bugzilla.suse.com/1257773
https://bugzilla.suse.com/1258280
https://bugzilla.suse.com/1259770
https://bugzilla.suse.com/1259797
https://bugzilla.suse.com/1259865
https://bugzilla.suse.com/1259870
https://bugzilla.suse.com/1259889
https://bugzilla.suse.com/1259997
https://bugzilla.suse.com/1260009
https://www.suse.com/security/cve/CVE-2026-23243
https://www.suse.com/security/cve/CVE-2026-23262
https://www.suse.com/security/cve/CVE-2026-23272
https://www.suse.com/security/cve/CVE-2026-23277
https://www.suse.com/security/cve/CVE-2026-23318
https://www.suse.com/security/cve/CVE-2026-23362
https://www.suse.com/security/cve/CVE-2026-23382
https://www.suse.com/security/cve/CVE-2026-23386
https://www.suse.com/security/cve/CVE-2026-23398
https://bugzilla.suse.com/1260489
https://bugzilla.suse.com/1260536
https://bugzilla.suse.com/1260551
https://bugzilla.suse.com/1260730
https://bugzilla.suse.com/1260799
https://lists.suse.com/pipermail/sle-updates/2026-May/046145.html
https://www.suse.com/security/cve/CVE-2024-26584
https://www.suse.com/security/cve/CVE-2025-38234
https://www.suse.com/security/cve/CVE-2025-39759
https://www.suse.com/security/cve/CVE-2025-71268
https://www.suse.com/security/cve/CVE-2025-71269
https://www.suse.com/security/cve/CVE-2026-22990
Severity: High
ID: 311740
File Name: suse_SU-2026-1668-1.nasl
Version: 1.1
Type: Local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/2/2026
Updated: 5/2/2026
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.2
Temporal Score: 4.9
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C
CVSS Score Source: CVE-2026-23318
Risk Factor: High
Base Score: 7.1
Temporal Score: 6.4
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_299-default, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:gfs2-kmp-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/1/2026
Vulnerability Publication Date: 7/21/2021
CVE: CVE-2024-26584, CVE-2025-38234, CVE-2025-39759, CVE-2025-71268, CVE-2025-71269, CVE-2026-22990, CVE-2026-23103, CVE-2026-23120, CVE-2026-23243, CVE-2026-23262, CVE-2026-23272, CVE-2026-23277, CVE-2026-23318, CVE-2026-23362, CVE-2026-23382, CVE-2026-23386, CVE-2026-23398
SuSE: SUSE-SU-2026:1668-1