The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2426-1 advisory.
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. (CVE-2020-26558)
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after- free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c. (CVE-2020-36385)
An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of- bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. (CVE-2020-36386)
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. (CVE-2021-0129)
In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel (CVE-2021-0512)
In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476 (CVE-2021-0605)
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. (CVE-2021-33624)
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5. (CVE-2021-3573)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2021:2426-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(151996);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/13");
script_cve_id(
"CVE-2020-26558",
"CVE-2020-36385",
"CVE-2020-36386",
"CVE-2021-0129",
"CVE-2021-0512",
"CVE-2021-0605",
"CVE-2021-3573",
"CVE-2021-33624",
"CVE-2021-34693"
);
script_xref(name:"SuSE", value:"SUSE-SU-2021:2426-1");
script_name(english:"SUSE SLES15 Security Update : kernel (SUSE-SU-2021:2426-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in
the SUSE-SU-2021:2426-1 advisory.
- Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby
man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication
procedure) by reflection of the public key and the authentication evidence of the initiating device,
potentially permitting this attacker to complete authenticated pairing with the responding device using
the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit
at a time. (CVE-2020-26558)
- An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-
free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is
called, aka CID-f5449e74802c. (CVE-2020-36385)
- An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-
bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. (CVE-2020-36386)
- Improper access control in BlueZ may allow an authenticated user to potentially enable information
disclosure via adjacent access. (CVE-2021-0129)
- In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to
a heap buffer overflow. This could lead to local escalation of privilege with no additional execution
privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android
kernelAndroid ID: A-173843328References: Upstream kernel (CVE-2021-0512)
- In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This
could lead to local information disclosure in the kernel with System execution privileges needed. User
interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476
(CVE-2021-0605)
- In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because
of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a
side-channel attack, aka CID-9183671af6db. (CVE-2021-33624)
- net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from
kernel stack memory because parts of a data structure are uninitialized. (CVE-2021-34693)
- A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way
user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev()
together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(),
hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their
privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5. (CVE-2021-3573)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1152489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1153274");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1154353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1155518");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1164648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174978");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176771");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1182470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1183712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1184212");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1184685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185195");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185486");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185675");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185677");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185701");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186206");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186463");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186672");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186949");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186950");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186951");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186955");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186957");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186958");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186961");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186962");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186964");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186965");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186968");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186969");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186970");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186971");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186973");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186974");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186977");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186978");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186979");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186980");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186981");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186983");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186984");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186985");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186986");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186991");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186992");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186994");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186997");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186998");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186999");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187000");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187001");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187002");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187003");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187038");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187050");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187067");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187068");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187069");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187072");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187143");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187144");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187171");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187263");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187356");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187403");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187404");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187407");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187408");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187410");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187411");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187412");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187413");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187452");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187595");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187795");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187867");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187927");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187980");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-26558");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-36385");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-36386");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-0129");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-0512");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-0605");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-33624");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-34693");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-3573");
# https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?59665627");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-3573");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2021-0512");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/05/24");
script_set_attribute(attribute:"patch_publication_date", value:"2021/07/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/07/22");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-rt-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-rt_debug");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:lttng-modules-kmp-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:oracleasm-kmp-rt");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(2)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP2", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'cluster-md-kmp-rt-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'dlm-kmp-rt-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'gfs2-kmp-rt-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-devel-rt-5.3.18-42.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-rt-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-rt-devel-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-rt_debug-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-rt_debug-devel-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-source-rt-5.3.18-42.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'kernel-syms-rt-5.3.18-42.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'ocfs2-kmp-rt-5.3.18-42.2', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']},
{'reference':'oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-rt-release-15.2']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-rt / dlm-kmp-rt / gfs2-kmp-rt / kernel-devel-rt / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0605
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
www.nessus.org/u?59665627
bugzilla.suse.com/1152489
bugzilla.suse.com/1153274
bugzilla.suse.com/1154353
bugzilla.suse.com/1155518
bugzilla.suse.com/1164648
bugzilla.suse.com/1174978
bugzilla.suse.com/1176771
bugzilla.suse.com/1179610
bugzilla.suse.com/1182470
bugzilla.suse.com/1183712
bugzilla.suse.com/1184212
bugzilla.suse.com/1184685
bugzilla.suse.com/1185195
bugzilla.suse.com/1185486
bugzilla.suse.com/1185589
bugzilla.suse.com/1185675
bugzilla.suse.com/1185677
bugzilla.suse.com/1185701
bugzilla.suse.com/1186206
bugzilla.suse.com/1186463
bugzilla.suse.com/1186666
bugzilla.suse.com/1186672
bugzilla.suse.com/1186752
bugzilla.suse.com/1186949
bugzilla.suse.com/1186950
bugzilla.suse.com/1186951
bugzilla.suse.com/1186952
bugzilla.suse.com/1186953
bugzilla.suse.com/1186954
bugzilla.suse.com/1186955
bugzilla.suse.com/1186956
bugzilla.suse.com/1186957
bugzilla.suse.com/1186958
bugzilla.suse.com/1186959
bugzilla.suse.com/1186960
bugzilla.suse.com/1186961
bugzilla.suse.com/1186962
bugzilla.suse.com/1186963
bugzilla.suse.com/1186964
bugzilla.suse.com/1186965
bugzilla.suse.com/1186966
bugzilla.suse.com/1186967
bugzilla.suse.com/1186968
bugzilla.suse.com/1186969
bugzilla.suse.com/1186970
bugzilla.suse.com/1186971
bugzilla.suse.com/1186972
bugzilla.suse.com/1186973
bugzilla.suse.com/1186974
bugzilla.suse.com/1186976
bugzilla.suse.com/1186977
bugzilla.suse.com/1186978
bugzilla.suse.com/1186979
bugzilla.suse.com/1186980
bugzilla.suse.com/1186981
bugzilla.suse.com/1186982
bugzilla.suse.com/1186983
bugzilla.suse.com/1186984
bugzilla.suse.com/1186985
bugzilla.suse.com/1186986
bugzilla.suse.com/1186987
bugzilla.suse.com/1186988
bugzilla.suse.com/1186989
bugzilla.suse.com/1186990
bugzilla.suse.com/1186991
bugzilla.suse.com/1186992
bugzilla.suse.com/1186993
bugzilla.suse.com/1186994
bugzilla.suse.com/1186995
bugzilla.suse.com/1186996
bugzilla.suse.com/1186997
bugzilla.suse.com/1186998
bugzilla.suse.com/1186999
bugzilla.suse.com/1187000
bugzilla.suse.com/1187001
bugzilla.suse.com/1187002
bugzilla.suse.com/1187003
bugzilla.suse.com/1187038
bugzilla.suse.com/1187050
bugzilla.suse.com/1187067
bugzilla.suse.com/1187068
bugzilla.suse.com/1187069
bugzilla.suse.com/1187072
bugzilla.suse.com/1187143
bugzilla.suse.com/1187144
bugzilla.suse.com/1187171
bugzilla.suse.com/1187263
bugzilla.suse.com/1187356
bugzilla.suse.com/1187402
bugzilla.suse.com/1187403
bugzilla.suse.com/1187404
bugzilla.suse.com/1187407
bugzilla.suse.com/1187408
bugzilla.suse.com/1187409
bugzilla.suse.com/1187410
bugzilla.suse.com/1187411
bugzilla.suse.com/1187412
bugzilla.suse.com/1187413
bugzilla.suse.com/1187452
bugzilla.suse.com/1187554
bugzilla.suse.com/1187595
bugzilla.suse.com/1187601
bugzilla.suse.com/1187795
bugzilla.suse.com/1187834
bugzilla.suse.com/1187867
bugzilla.suse.com/1187883
bugzilla.suse.com/1187886
bugzilla.suse.com/1187927
bugzilla.suse.com/1187972
bugzilla.suse.com/1187980
www.suse.com/security/cve/CVE-2020-26558
www.suse.com/security/cve/CVE-2020-36385
www.suse.com/security/cve/CVE-2020-36386
www.suse.com/security/cve/CVE-2021-0129
www.suse.com/security/cve/CVE-2021-0512
www.suse.com/security/cve/CVE-2021-0605
www.suse.com/security/cve/CVE-2021-33624
www.suse.com/security/cve/CVE-2021-34693
www.suse.com/security/cve/CVE-2021-3573