The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:1008 advisory.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. (CVE-2022-3564)
A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-4378)
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel.
This flaw allows an attacker to conduct a remote denial (CVE-2022-4379)
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution. (CVE-2023-0179)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2023:1008. The text
# itself is copyright (C) Red Hat, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(171996);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/26");
script_cve_id(
"CVE-2022-3564",
"CVE-2022-4378",
"CVE-2022-4379",
"CVE-2023-0179"
);
script_xref(name:"RHSA", value:"2023:1008");
script_name(english:"RHEL 9 : kpatch-patch (RHSA-2023:1008)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat host is missing one or more security updates for kpatch-patch.");
script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as
referenced in the RHSA-2023:1008 advisory.
- A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the
function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The
manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated
identifier of this vulnerability is VDB-211087. (CVE-2022-3564)
- A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain
kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their
privileges on the system. (CVE-2022-4378)
- A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel.
This flaw allows an attacker to conduct a remote denial (CVE-2022-4379)
- A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could
allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to
the root user via arbitrary code execution. (CVE-2023-0179)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-3564");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-4378");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-4379");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2023-0179");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2023:1008");
script_set_attribute(attribute:"solution", value:
"Update the RHEL kpatch-patch package based on the guidance in RHSA-2023:1008.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-0179");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(120, 131, 190, 416, 787);
script_set_attribute(attribute:"vendor_severity", value:"Important");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/10/17");
script_set_attribute(attribute:"patch_publication_date", value:"2023/02/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/02/28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:9");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_aus:9.2");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_e4s:9.2");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_eus:9.2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-5_14_0-162_12_1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-5_14_0-162_6_1");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
include('rhel.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '9')) audit(AUDIT_OS_NOT, 'Red Hat 9.x', 'Red Hat ' + os_ver);
if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
var uname_r = get_kb_item("Host/uname-r");
if (empty_or_null(uname_r)) audit(AUDIT_UNKNOWN_APP_VER, "kernel");
var kernel_live_checks = [
{
'repo_relative_urls': [
'content/aus/rhel9/9.2/x86_64/appstream/debug',
'content/aus/rhel9/9.2/x86_64/appstream/os',
'content/aus/rhel9/9.2/x86_64/appstream/source/SRPMS',
'content/aus/rhel9/9.2/x86_64/baseos/debug',
'content/aus/rhel9/9.2/x86_64/baseos/os',
'content/aus/rhel9/9.2/x86_64/baseos/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/appstream/debug',
'content/e4s/rhel9/9.2/ppc64le/appstream/os',
'content/e4s/rhel9/9.2/ppc64le/appstream/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/baseos/debug',
'content/e4s/rhel9/9.2/ppc64le/baseos/os',
'content/e4s/rhel9/9.2/ppc64le/baseos/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/highavailability/debug',
'content/e4s/rhel9/9.2/ppc64le/highavailability/os',
'content/e4s/rhel9/9.2/ppc64le/highavailability/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/resilientstorage/debug',
'content/e4s/rhel9/9.2/ppc64le/resilientstorage/os',
'content/e4s/rhel9/9.2/ppc64le/resilientstorage/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/sap-solutions/debug',
'content/e4s/rhel9/9.2/ppc64le/sap-solutions/os',
'content/e4s/rhel9/9.2/ppc64le/sap-solutions/source/SRPMS',
'content/e4s/rhel9/9.2/ppc64le/sap/debug',
'content/e4s/rhel9/9.2/ppc64le/sap/os',
'content/e4s/rhel9/9.2/ppc64le/sap/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/appstream/debug',
'content/e4s/rhel9/9.2/x86_64/appstream/os',
'content/e4s/rhel9/9.2/x86_64/appstream/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/baseos/debug',
'content/e4s/rhel9/9.2/x86_64/baseos/os',
'content/e4s/rhel9/9.2/x86_64/baseos/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/highavailability/debug',
'content/e4s/rhel9/9.2/x86_64/highavailability/os',
'content/e4s/rhel9/9.2/x86_64/highavailability/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/nfv/debug',
'content/e4s/rhel9/9.2/x86_64/nfv/os',
'content/e4s/rhel9/9.2/x86_64/nfv/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/resilientstorage/debug',
'content/e4s/rhel9/9.2/x86_64/resilientstorage/os',
'content/e4s/rhel9/9.2/x86_64/resilientstorage/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/rt/debug',
'content/e4s/rhel9/9.2/x86_64/rt/os',
'content/e4s/rhel9/9.2/x86_64/rt/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/sap-solutions/debug',
'content/e4s/rhel9/9.2/x86_64/sap-solutions/os',
'content/e4s/rhel9/9.2/x86_64/sap-solutions/source/SRPMS',
'content/e4s/rhel9/9.2/x86_64/sap/debug',
'content/e4s/rhel9/9.2/x86_64/sap/os',
'content/e4s/rhel9/9.2/x86_64/sap/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/appstream/debug',
'content/eus/rhel9/9.2/ppc64le/appstream/os',
'content/eus/rhel9/9.2/ppc64le/appstream/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/baseos/debug',
'content/eus/rhel9/9.2/ppc64le/baseos/os',
'content/eus/rhel9/9.2/ppc64le/baseos/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/codeready-builder/debug',
'content/eus/rhel9/9.2/ppc64le/codeready-builder/os',
'content/eus/rhel9/9.2/ppc64le/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/highavailability/debug',
'content/eus/rhel9/9.2/ppc64le/highavailability/os',
'content/eus/rhel9/9.2/ppc64le/highavailability/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/resilientstorage/debug',
'content/eus/rhel9/9.2/ppc64le/resilientstorage/os',
'content/eus/rhel9/9.2/ppc64le/resilientstorage/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/sap-solutions/debug',
'content/eus/rhel9/9.2/ppc64le/sap-solutions/os',
'content/eus/rhel9/9.2/ppc64le/sap-solutions/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/sap/debug',
'content/eus/rhel9/9.2/ppc64le/sap/os',
'content/eus/rhel9/9.2/ppc64le/sap/source/SRPMS',
'content/eus/rhel9/9.2/ppc64le/supplementary/debug',
'content/eus/rhel9/9.2/ppc64le/supplementary/os',
'content/eus/rhel9/9.2/ppc64le/supplementary/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/appstream/debug',
'content/eus/rhel9/9.2/x86_64/appstream/os',
'content/eus/rhel9/9.2/x86_64/appstream/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/baseos/debug',
'content/eus/rhel9/9.2/x86_64/baseos/os',
'content/eus/rhel9/9.2/x86_64/baseos/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/codeready-builder/debug',
'content/eus/rhel9/9.2/x86_64/codeready-builder/os',
'content/eus/rhel9/9.2/x86_64/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/highavailability/debug',
'content/eus/rhel9/9.2/x86_64/highavailability/os',
'content/eus/rhel9/9.2/x86_64/highavailability/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/resilientstorage/debug',
'content/eus/rhel9/9.2/x86_64/resilientstorage/os',
'content/eus/rhel9/9.2/x86_64/resilientstorage/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/sap-solutions/debug',
'content/eus/rhel9/9.2/x86_64/sap-solutions/os',
'content/eus/rhel9/9.2/x86_64/sap-solutions/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/sap/debug',
'content/eus/rhel9/9.2/x86_64/sap/os',
'content/eus/rhel9/9.2/x86_64/sap/source/SRPMS',
'content/eus/rhel9/9.2/x86_64/supplementary/debug',
'content/eus/rhel9/9.2/x86_64/supplementary/os',
'content/eus/rhel9/9.2/x86_64/supplementary/source/SRPMS'
],
'kernels': {
'5.14.0-162.12.1.el9_1.ppc64le': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_12_1-1-1.el9_1', 'sp':'2', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.12.1.el9_1.x86_64': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_12_1-1-1.el9_1', 'sp':'2', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.6.1.el9_1.ppc64le': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_6_1-1-2.el9_1', 'sp':'2', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.6.1.el9_1.x86_64': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_6_1-1-2.el9_1', 'sp':'2', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE}
]
}
}
},
{
'repo_relative_urls': [
'content/dist/rhel9/9.1/ppc64le/appstream/debug',
'content/dist/rhel9/9.1/ppc64le/appstream/os',
'content/dist/rhel9/9.1/ppc64le/appstream/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/baseos/debug',
'content/dist/rhel9/9.1/ppc64le/baseos/os',
'content/dist/rhel9/9.1/ppc64le/baseos/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/codeready-builder/debug',
'content/dist/rhel9/9.1/ppc64le/codeready-builder/os',
'content/dist/rhel9/9.1/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/highavailability/debug',
'content/dist/rhel9/9.1/ppc64le/highavailability/os',
'content/dist/rhel9/9.1/ppc64le/highavailability/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/resilientstorage/debug',
'content/dist/rhel9/9.1/ppc64le/resilientstorage/os',
'content/dist/rhel9/9.1/ppc64le/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/sap-solutions/debug',
'content/dist/rhel9/9.1/ppc64le/sap-solutions/os',
'content/dist/rhel9/9.1/ppc64le/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/sap/debug',
'content/dist/rhel9/9.1/ppc64le/sap/os',
'content/dist/rhel9/9.1/ppc64le/sap/source/SRPMS',
'content/dist/rhel9/9.1/ppc64le/supplementary/debug',
'content/dist/rhel9/9.1/ppc64le/supplementary/os',
'content/dist/rhel9/9.1/ppc64le/supplementary/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/appstream/debug',
'content/dist/rhel9/9.1/x86_64/appstream/os',
'content/dist/rhel9/9.1/x86_64/appstream/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/baseos/debug',
'content/dist/rhel9/9.1/x86_64/baseos/os',
'content/dist/rhel9/9.1/x86_64/baseos/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/codeready-builder/debug',
'content/dist/rhel9/9.1/x86_64/codeready-builder/os',
'content/dist/rhel9/9.1/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/highavailability/debug',
'content/dist/rhel9/9.1/x86_64/highavailability/os',
'content/dist/rhel9/9.1/x86_64/highavailability/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/nfv/debug',
'content/dist/rhel9/9.1/x86_64/nfv/os',
'content/dist/rhel9/9.1/x86_64/nfv/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/resilientstorage/debug',
'content/dist/rhel9/9.1/x86_64/resilientstorage/os',
'content/dist/rhel9/9.1/x86_64/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/rt/debug',
'content/dist/rhel9/9.1/x86_64/rt/os',
'content/dist/rhel9/9.1/x86_64/rt/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/sap-solutions/debug',
'content/dist/rhel9/9.1/x86_64/sap-solutions/os',
'content/dist/rhel9/9.1/x86_64/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/sap/debug',
'content/dist/rhel9/9.1/x86_64/sap/os',
'content/dist/rhel9/9.1/x86_64/sap/source/SRPMS',
'content/dist/rhel9/9.1/x86_64/supplementary/debug',
'content/dist/rhel9/9.1/x86_64/supplementary/os',
'content/dist/rhel9/9.1/x86_64/supplementary/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/appstream/debug',
'content/dist/rhel9/9.2/ppc64le/appstream/os',
'content/dist/rhel9/9.2/ppc64le/appstream/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/baseos/debug',
'content/dist/rhel9/9.2/ppc64le/baseos/os',
'content/dist/rhel9/9.2/ppc64le/baseos/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/codeready-builder/debug',
'content/dist/rhel9/9.2/ppc64le/codeready-builder/os',
'content/dist/rhel9/9.2/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/highavailability/debug',
'content/dist/rhel9/9.2/ppc64le/highavailability/os',
'content/dist/rhel9/9.2/ppc64le/highavailability/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/resilientstorage/debug',
'content/dist/rhel9/9.2/ppc64le/resilientstorage/os',
'content/dist/rhel9/9.2/ppc64le/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/sap-solutions/debug',
'content/dist/rhel9/9.2/ppc64le/sap-solutions/os',
'content/dist/rhel9/9.2/ppc64le/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/sap/debug',
'content/dist/rhel9/9.2/ppc64le/sap/os',
'content/dist/rhel9/9.2/ppc64le/sap/source/SRPMS',
'content/dist/rhel9/9.2/ppc64le/supplementary/debug',
'content/dist/rhel9/9.2/ppc64le/supplementary/os',
'content/dist/rhel9/9.2/ppc64le/supplementary/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/appstream/debug',
'content/dist/rhel9/9.2/x86_64/appstream/os',
'content/dist/rhel9/9.2/x86_64/appstream/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/baseos/debug',
'content/dist/rhel9/9.2/x86_64/baseos/os',
'content/dist/rhel9/9.2/x86_64/baseos/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/codeready-builder/debug',
'content/dist/rhel9/9.2/x86_64/codeready-builder/os',
'content/dist/rhel9/9.2/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/highavailability/debug',
'content/dist/rhel9/9.2/x86_64/highavailability/os',
'content/dist/rhel9/9.2/x86_64/highavailability/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/nfv/debug',
'content/dist/rhel9/9.2/x86_64/nfv/os',
'content/dist/rhel9/9.2/x86_64/nfv/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/resilientstorage/debug',
'content/dist/rhel9/9.2/x86_64/resilientstorage/os',
'content/dist/rhel9/9.2/x86_64/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/rt/debug',
'content/dist/rhel9/9.2/x86_64/rt/os',
'content/dist/rhel9/9.2/x86_64/rt/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/sap-solutions/debug',
'content/dist/rhel9/9.2/x86_64/sap-solutions/os',
'content/dist/rhel9/9.2/x86_64/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/sap/debug',
'content/dist/rhel9/9.2/x86_64/sap/os',
'content/dist/rhel9/9.2/x86_64/sap/source/SRPMS',
'content/dist/rhel9/9.2/x86_64/supplementary/debug',
'content/dist/rhel9/9.2/x86_64/supplementary/os',
'content/dist/rhel9/9.2/x86_64/supplementary/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/appstream/debug',
'content/dist/rhel9/9.3/ppc64le/appstream/os',
'content/dist/rhel9/9.3/ppc64le/appstream/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/baseos/debug',
'content/dist/rhel9/9.3/ppc64le/baseos/os',
'content/dist/rhel9/9.3/ppc64le/baseos/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/codeready-builder/debug',
'content/dist/rhel9/9.3/ppc64le/codeready-builder/os',
'content/dist/rhel9/9.3/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/highavailability/debug',
'content/dist/rhel9/9.3/ppc64le/highavailability/os',
'content/dist/rhel9/9.3/ppc64le/highavailability/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/resilientstorage/debug',
'content/dist/rhel9/9.3/ppc64le/resilientstorage/os',
'content/dist/rhel9/9.3/ppc64le/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/sap-solutions/debug',
'content/dist/rhel9/9.3/ppc64le/sap-solutions/os',
'content/dist/rhel9/9.3/ppc64le/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/sap/debug',
'content/dist/rhel9/9.3/ppc64le/sap/os',
'content/dist/rhel9/9.3/ppc64le/sap/source/SRPMS',
'content/dist/rhel9/9.3/ppc64le/supplementary/debug',
'content/dist/rhel9/9.3/ppc64le/supplementary/os',
'content/dist/rhel9/9.3/ppc64le/supplementary/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/appstream/debug',
'content/dist/rhel9/9.3/x86_64/appstream/os',
'content/dist/rhel9/9.3/x86_64/appstream/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/baseos/debug',
'content/dist/rhel9/9.3/x86_64/baseos/os',
'content/dist/rhel9/9.3/x86_64/baseos/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/codeready-builder/debug',
'content/dist/rhel9/9.3/x86_64/codeready-builder/os',
'content/dist/rhel9/9.3/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/highavailability/debug',
'content/dist/rhel9/9.3/x86_64/highavailability/os',
'content/dist/rhel9/9.3/x86_64/highavailability/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/nfv/debug',
'content/dist/rhel9/9.3/x86_64/nfv/os',
'content/dist/rhel9/9.3/x86_64/nfv/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/resilientstorage/debug',
'content/dist/rhel9/9.3/x86_64/resilientstorage/os',
'content/dist/rhel9/9.3/x86_64/resilientstorage/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/rt/debug',
'content/dist/rhel9/9.3/x86_64/rt/os',
'content/dist/rhel9/9.3/x86_64/rt/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/sap-solutions/debug',
'content/dist/rhel9/9.3/x86_64/sap-solutions/os',
'content/dist/rhel9/9.3/x86_64/sap-solutions/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/sap/debug',
'content/dist/rhel9/9.3/x86_64/sap/os',
'content/dist/rhel9/9.3/x86_64/sap/source/SRPMS',
'content/dist/rhel9/9.3/x86_64/supplementary/debug',
'content/dist/rhel9/9.3/x86_64/supplementary/os',
'content/dist/rhel9/9.3/x86_64/supplementary/source/SRPMS',
'content/dist/rhel9/9/ppc64le/appstream/debug',
'content/dist/rhel9/9/ppc64le/appstream/os',
'content/dist/rhel9/9/ppc64le/appstream/source/SRPMS',
'content/dist/rhel9/9/ppc64le/baseos/debug',
'content/dist/rhel9/9/ppc64le/baseos/os',
'content/dist/rhel9/9/ppc64le/baseos/source/SRPMS',
'content/dist/rhel9/9/ppc64le/codeready-builder/debug',
'content/dist/rhel9/9/ppc64le/codeready-builder/os',
'content/dist/rhel9/9/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel9/9/ppc64le/highavailability/debug',
'content/dist/rhel9/9/ppc64le/highavailability/os',
'content/dist/rhel9/9/ppc64le/highavailability/source/SRPMS',
'content/dist/rhel9/9/ppc64le/resilientstorage/debug',
'content/dist/rhel9/9/ppc64le/resilientstorage/os',
'content/dist/rhel9/9/ppc64le/resilientstorage/source/SRPMS',
'content/dist/rhel9/9/ppc64le/sap-solutions/debug',
'content/dist/rhel9/9/ppc64le/sap-solutions/os',
'content/dist/rhel9/9/ppc64le/sap-solutions/source/SRPMS',
'content/dist/rhel9/9/ppc64le/sap/debug',
'content/dist/rhel9/9/ppc64le/sap/os',
'content/dist/rhel9/9/ppc64le/sap/source/SRPMS',
'content/dist/rhel9/9/ppc64le/supplementary/debug',
'content/dist/rhel9/9/ppc64le/supplementary/os',
'content/dist/rhel9/9/ppc64le/supplementary/source/SRPMS',
'content/dist/rhel9/9/x86_64/appstream/debug',
'content/dist/rhel9/9/x86_64/appstream/os',
'content/dist/rhel9/9/x86_64/appstream/source/SRPMS',
'content/dist/rhel9/9/x86_64/baseos/debug',
'content/dist/rhel9/9/x86_64/baseos/os',
'content/dist/rhel9/9/x86_64/baseos/source/SRPMS',
'content/dist/rhel9/9/x86_64/codeready-builder/debug',
'content/dist/rhel9/9/x86_64/codeready-builder/os',
'content/dist/rhel9/9/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel9/9/x86_64/highavailability/debug',
'content/dist/rhel9/9/x86_64/highavailability/os',
'content/dist/rhel9/9/x86_64/highavailability/source/SRPMS',
'content/dist/rhel9/9/x86_64/nfv/debug',
'content/dist/rhel9/9/x86_64/nfv/os',
'content/dist/rhel9/9/x86_64/nfv/source/SRPMS',
'content/dist/rhel9/9/x86_64/resilientstorage/debug',
'content/dist/rhel9/9/x86_64/resilientstorage/os',
'content/dist/rhel9/9/x86_64/resilientstorage/source/SRPMS',
'content/dist/rhel9/9/x86_64/rt/debug',
'content/dist/rhel9/9/x86_64/rt/os',
'content/dist/rhel9/9/x86_64/rt/source/SRPMS',
'content/dist/rhel9/9/x86_64/sap-solutions/debug',
'content/dist/rhel9/9/x86_64/sap-solutions/os',
'content/dist/rhel9/9/x86_64/sap-solutions/source/SRPMS',
'content/dist/rhel9/9/x86_64/sap/debug',
'content/dist/rhel9/9/x86_64/sap/os',
'content/dist/rhel9/9/x86_64/sap/source/SRPMS',
'content/dist/rhel9/9/x86_64/supplementary/debug',
'content/dist/rhel9/9/x86_64/supplementary/os',
'content/dist/rhel9/9/x86_64/supplementary/source/SRPMS'
],
'kernels': {
'5.14.0-162.12.1.el9_1.ppc64le': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_12_1-1-1.el9_1', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.12.1.el9_1.x86_64': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_12_1-1-1.el9_1', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.6.1.el9_1.ppc64le': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_6_1-1-2.el9_1', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
]
},
'5.14.0-162.6.1.el9_1.x86_64': {
'pkgs': [
{'reference':'kpatch-patch-5_14_0-162_6_1-1-2.el9_1', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE}
]
}
}
}
];
var applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:kernel_live_checks);
if(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);
var flag = 0;
var kernel_affected = FALSE;
foreach var kernel_array ( kernel_live_checks ) {
var repo_relative_urls = NULL;
if (!empty_or_null(kernel_array['repo_relative_urls'])) repo_relative_urls = kernel_array['repo_relative_urls'];
var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);
var kpatch_details = kernel_array['kernels'][uname_r];
if (empty_or_null(kpatch_details)) continue;
kernel_affected = TRUE;
foreach var pkg ( kpatch_details['pkgs'] ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];
if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];
if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];
if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];
if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];
if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];
if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
if (reference &&
_release &&
rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&
(applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&
rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
# No kpatch details found for the running kernel version
if (!kernel_affected) audit(AUDIT_INST_VER_NOT_VULN, 'kernel', uname_r);
if (flag)
{
var extra = NULL;
if (isnull(applicable_repo_urls) || !applicable_repo_urls) extra = rpm_report_get() + redhat_report_repo_caveat();
else extra = rpm_report_get();
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : extra
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kpatch-patch-5_14_0-162_12_1 / kpatch-patch-5_14_0-162_6_1');
}
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux | 9 | cpe:/o:redhat:enterprise_linux:9 |
redhat | rhel_aus | 9.2 | cpe:/o:redhat:rhel_aus:9.2 |
redhat | rhel_e4s | 9.2 | cpe:/o:redhat:rhel_e4s:9.2 |
redhat | rhel_eus | 9.2 | cpe:/o:redhat:rhel_eus:9.2 |
redhat | enterprise_linux | kpatch-patch-5_14_0-162_12_1 | p-cpe:/a:redhat:enterprise_linux:kpatch-patch-5_14_0-162_12_1 |
redhat | enterprise_linux | kpatch-patch-5_14_0-162_6_1 | p-cpe:/a:redhat:enterprise_linux:kpatch-patch-5_14_0-162_6_1 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
access.redhat.com/errata/RHSA-2023:1008
access.redhat.com/security/cve/CVE-2022-3564
access.redhat.com/security/cve/CVE-2022-4378
access.redhat.com/security/cve/CVE-2022-4379
access.redhat.com/security/cve/CVE-2023-0179