SUSE SLES15 : Recommended update for initial livepatch (SUSE-SU-2026:1643-1)

high Nessus Plugin ID 311748

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1643-1 advisory.

The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).
- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).
- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).
- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems before insertion (bsc#1260009).
- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).
- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).
- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).
- CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (bsc#1260562).
- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).
- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).
- CVE-2026-23412: netfilter: bpf: defer hook memory release until rcu readers are done (bsc#1261412).
- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).
- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).

The following non security issues were fixed:

- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).
- KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing (bsc#1253122).
- net: mana: fix use-after-free in add_adev() error path (git-fixes).
- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).
- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).
- xen/privcmd: unregister xenstore notifier on module exit (git-fixes).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1252073

https://bugzilla.suse.com/1253122

https://bugzilla.suse.com/1257506

https://bugzilla.suse.com/1257773

https://bugzilla.suse.com/1259188

https://bugzilla.suse.com/1259461

https://bugzilla.suse.com/1259580

https://bugzilla.suse.com/1259707

https://bugzilla.suse.com/1259797

https://bugzilla.suse.com/1259998

https://bugzilla.suse.com/1260005

https://bugzilla.suse.com/1260009

https://bugzilla.suse.com/1260347

https://bugzilla.suse.com/1260471

https://bugzilla.suse.com/1260486

https://bugzilla.suse.com/1260562

https://bugzilla.suse.com/1260730

https://bugzilla.suse.com/1261412

https://bugzilla.suse.com/1261498

https://lists.suse.com/pipermail/sle-updates/2026-April/046102.html

https://www.suse.com/security/cve/CVE-2025-39998

https://www.suse.com/security/cve/CVE-2026-23103

https://www.suse.com/security/cve/CVE-2026-23231

https://www.suse.com/security/cve/CVE-2026-23243

https://www.suse.com/security/cve/CVE-2026-23272

https://www.suse.com/security/cve/CVE-2026-23274

https://www.suse.com/security/cve/CVE-2026-23278

https://www.suse.com/security/cve/CVE-2026-23293

https://www.suse.com/security/cve/CVE-2026-23317

https://www.suse.com/security/cve/CVE-2026-23381

https://www.suse.com/security/cve/CVE-2026-23398

https://www.suse.com/security/cve/CVE-2026-23412

https://www.suse.com/security/cve/CVE-2026-23413

https://www.suse.com/security/cve/CVE-2026-31788

Plugin Details

Severity: High

ID: 311748

File Name: suse_SU-2026-1643-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/2/2026

Updated: 5/2/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23413

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2026-31788

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_23_95-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/28/2026

Vulnerability Publication Date: 10/15/2025

Reference Information

CVE: CVE-2025-39998, CVE-2026-23103, CVE-2026-23231, CVE-2026-23243, CVE-2026-23272, CVE-2026-23274, CVE-2026-23278, CVE-2026-23293, CVE-2026-23317, CVE-2026-23381, CVE-2026-23398, CVE-2026-23412, CVE-2026-23413, CVE-2026-31788

SuSE: SUSE-SU-2026:1643-1