The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:3998-1 advisory.
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-1882)
A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. (CVE-2022-2153)
A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
(CVE-2022-2964)
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. (CVE-2022-2978)
A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect. (CVE-2022-3169)
drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
(CVE-2022-33981)
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-3424)
A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability. (CVE-2022-3435)
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability. (CVE-2022-3521)
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
The identifier VDB-211021 was assigned to this vulnerability. (CVE-2022-3524)
A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024. (CVE-2022-3526)
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability. (CVE-2022-3545)
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088. (CVE-2022-3565)
An out-of-bounds memory write flaw was found in the Linux kernel’s Kid-friendly Wired Controller driver.
This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.
(CVE-2022-3577)
A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service. (CVE-2022-3586)
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
(CVE-2022-3594)
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability. (CVE-2022-3619)
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920. (CVE-2022-3621)
A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability. (CVE-2022-3625)
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. (CVE-2022-3628)
A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. (CVE-2022-3629)
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
(CVE-2022-3633)
A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944. (CVE-2022-3640)
A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability. (CVE-2022-3646)
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
The identifier of this vulnerability is VDB-211992. (CVE-2022-3649)
A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.
(CVE-2022-40476)
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
(CVE-2022-40768)
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c. (CVE-2022-41674)
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
(CVE-2022-42703)
A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code. (CVE-2022-42719)
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after- free conditions to potentially execute code. (CVE-2022-42720)
A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code. (CVE-2022-42721)
In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices. (CVE-2022-42722)
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user- space client to corrupt the monitor’s internal memory. (CVE-2022-43750)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2022:3998-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(167728);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/13");
script_cve_id(
"CVE-2022-1882",
"CVE-2022-2153",
"CVE-2022-2964",
"CVE-2022-2978",
"CVE-2022-3169",
"CVE-2022-3424",
"CVE-2022-3435",
"CVE-2022-3521",
"CVE-2022-3524",
"CVE-2022-3526",
"CVE-2022-3535",
"CVE-2022-3542",
"CVE-2022-3545",
"CVE-2022-3565",
"CVE-2022-3577",
"CVE-2022-3586",
"CVE-2022-3594",
"CVE-2022-3619",
"CVE-2022-3621",
"CVE-2022-3625",
"CVE-2022-3628",
"CVE-2022-3629",
"CVE-2022-3633",
"CVE-2022-3640",
"CVE-2022-3646",
"CVE-2022-3649",
"CVE-2022-28748",
"CVE-2022-33981",
"CVE-2022-40476",
"CVE-2022-40768",
"CVE-2022-41674",
"CVE-2022-42703",
"CVE-2022-42719",
"CVE-2022-42720",
"CVE-2022-42721",
"CVE-2022-42722",
"CVE-2022-43750"
);
script_xref(name:"SuSE", value:"SUSE-SU-2022:3998-1");
script_name(english:"SUSE SLES15 Security Update : kernel (SUSE-SU-2022:3998-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as
referenced in the SUSE-SU-2022:3998-1 advisory.
- A use-after-free flaw was found in the Linux kernel's pipes functionality in how a user performs
manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This
flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-1882)
- A flaw was found in the Linux kernel's KVM when attempting to set a SynIC IRQ. This issue makes it
possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This
flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel
oops condition that results in a denial of service. (CVE-2022-2153)
- A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet
Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
(CVE-2022-2964)
- A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function
security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use
this flaw to crash the system or potentially escalate their privileges on the system. (CVE-2022-2978)
- A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request
of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting
in a PCIe link disconnect. (CVE-2022-3169)
- drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of
a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
(CVE-2022-33981)
- A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first
gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the
gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate
their privileges on the system. (CVE-2022-3424)
- A vulnerability classified as problematic has been found in Linux Kernel. This affects the function
fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to
out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to
fix this issue. The identifier VDB-210357 was assigned to this vulnerability. (CVE-2022-3435)
- A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects
the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to
race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier
assigned to this vulnerability. (CVE-2022-3521)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this
vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to
memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
The identifier VDB-211021 was assigned to this vulnerability. (CVE-2022-3524)
- A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the
function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation
leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this
issue. The identifier of this vulnerability is VDB-211024. (CVE-2022-3526)
- A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability
is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the
component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this
issue. The identifier VDB-211045 was assigned to this vulnerability. (CVE-2022-3545)
- A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue
is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The
manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier
of this vulnerability is VDB-211088. (CVE-2022-3565)
- An out-of-bounds memory write flaw was found in the Linux kernel's Kid-friendly Wired Controller driver.
This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in
bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have
inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.
(CVE-2022-3577)
- A flaw was found in the Linux kernel's networking code. A use-after-free was found in the way the sch_sfb
enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed)
into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of
service. (CVE-2022-3586)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this
vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The
manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to
apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
(CVE-2022-3594)
- A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects
the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The
manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the
identifier assigned to this vulnerability. (CVE-2022-3619)
- A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function
nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads
to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a
patch to fix this issue. The identifier of this vulnerability is VDB-211920. (CVE-2022-3621)
- A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function
devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The
manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier
VDB-211929 was assigned to this vulnerability. (CVE-2022-3625)
- A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs
when a user connects to a malicious USB device. This can allow a local user to crash the system or
escalate their privileges. (CVE-2022-3628)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects
the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It
is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this
vulnerability. (CVE-2022-3629)
- A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function
j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is
recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
(CVE-2022-3633)
- A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function
l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads
to use after free. It is recommended to apply a patch to fix this issue. The identifier of this
vulnerability is VDB-211944. (CVE-2022-3640)
- A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects
the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The
manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a
patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability. (CVE-2022-3646)
- A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function
nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after
free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
The identifier of this vulnerability is VDB-211992. (CVE-2022-3649)
- A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A
local user could use this flaw to crash the system or potentially cause a denial of service.
(CVE-2022-40476)
- drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information
from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
(CVE-2022-40768)
- An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could
cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c. (CVE-2022-41674)
- mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
(CVE-2022-42703)
- A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through
5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and
potentially execute code. (CVE-2022-42719)
- Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through
5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-
free conditions to potentially execute code. (CVE-2022-42720)
- A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before
5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in
turn, potentially execute code. (CVE-2022-42721)
- In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the
mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon
protection of P2P devices. (CVE-2022-42722)
- drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-
space client to corrupt the monitor's internal memory. (CVE-2022-43750)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1065729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1071995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1152472");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1152489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1188238");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196018");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1199904");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200567");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202700");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202914");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203098");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203229");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203699");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203701");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203802");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203922");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203979");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204017");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204051");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204059");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204125");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204142");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204166");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204168");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204171");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204355");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204413");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204415");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204417");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204428");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204431");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204439");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204498");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204533");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204569");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204574");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204575");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204637");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204646");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204650");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204693");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204728");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204926");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204933");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204934");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204947");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204957");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204970");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-1882");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2153");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-28748");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2978");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3169");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-33981");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3424");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3435");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3521");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3524");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3526");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3535");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3542");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3545");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3565");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3577");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3594");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3619");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3621");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3625");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3628");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3629");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3633");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3640");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3646");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3649");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-40476");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-40768");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41674");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42703");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42719");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42720");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42721");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42722");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-43750");
# https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0675eac7");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-1882");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-42719");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/03/07");
script_set_attribute(attribute:"patch_publication_date", value:"2022/11/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/11/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-azure");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-azure-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel-azure");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source-azure");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms-azure");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15|SLES_SAP15)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP4", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP4", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-azure-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-azure-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-azure-devel-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-azure-devel-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-devel-azure-5.14.21-150400.14.21.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-source-azure-5.14.21-150400.14.21.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-syms-azure-5.14.21-150400.14.21.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-syms-azure-5.14.21-150400.14.21.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-azure-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-azure-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-azure-devel-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-azure-devel-5.14.21-150400.14.21.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-devel-azure-5.14.21-150400.14.21.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-source-azure-5.14.21-150400.14.21.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-syms-azure-5.14.21-150400.14.21.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-syms-azure-5.14.21-150400.14.21.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-public-cloud-release-15.4', 'sles-release-15.4']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-azure / kernel-azure-devel / kernel-devel-azure / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | kernel-azure | p-cpe:/a:novell:suse_linux:kernel-azure |
novell | suse_linux | kernel-azure-devel | p-cpe:/a:novell:suse_linux:kernel-azure-devel |
novell | suse_linux | kernel-devel-azure | p-cpe:/a:novell:suse_linux:kernel-devel-azure |
novell | suse_linux | kernel-source-azure | p-cpe:/a:novell:suse_linux:kernel-source-azure |
novell | suse_linux | kernel-syms-azure | p-cpe:/a:novell:suse_linux:kernel-syms-azure |
novell | suse_linux | 15 | cpe:/o:novell:suse_linux:15 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3526
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3542
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
www.nessus.org/u?0675eac7
bugzilla.suse.com/1065729
bugzilla.suse.com/1071995
bugzilla.suse.com/1152472
bugzilla.suse.com/1152489
bugzilla.suse.com/1188238
bugzilla.suse.com/1194869
bugzilla.suse.com/1196018
bugzilla.suse.com/1196632
bugzilla.suse.com/1199904
bugzilla.suse.com/1200567
bugzilla.suse.com/1200692
bugzilla.suse.com/1200788
bugzilla.suse.com/1202187
bugzilla.suse.com/1202686
bugzilla.suse.com/1202700
bugzilla.suse.com/1202914
bugzilla.suse.com/1203098
bugzilla.suse.com/1203229
bugzilla.suse.com/1203290
bugzilla.suse.com/1203435
bugzilla.suse.com/1203514
bugzilla.suse.com/1203699
bugzilla.suse.com/1203701
bugzilla.suse.com/1203767
bugzilla.suse.com/1203770
bugzilla.suse.com/1203802
bugzilla.suse.com/1203922
bugzilla.suse.com/1203979
bugzilla.suse.com/1204017
bugzilla.suse.com/1204051
bugzilla.suse.com/1204059
bugzilla.suse.com/1204060
bugzilla.suse.com/1204125
bugzilla.suse.com/1204142
bugzilla.suse.com/1204166
bugzilla.suse.com/1204168
bugzilla.suse.com/1204171
bugzilla.suse.com/1204241
bugzilla.suse.com/1204353
bugzilla.suse.com/1204354
bugzilla.suse.com/1204355
bugzilla.suse.com/1204402
bugzilla.suse.com/1204413
bugzilla.suse.com/1204415
bugzilla.suse.com/1204417
bugzilla.suse.com/1204428
bugzilla.suse.com/1204431
bugzilla.suse.com/1204439
bugzilla.suse.com/1204470
bugzilla.suse.com/1204479
bugzilla.suse.com/1204498
bugzilla.suse.com/1204533
bugzilla.suse.com/1204569
bugzilla.suse.com/1204574
bugzilla.suse.com/1204575
bugzilla.suse.com/1204619
bugzilla.suse.com/1204635
bugzilla.suse.com/1204637
bugzilla.suse.com/1204646
bugzilla.suse.com/1204647
bugzilla.suse.com/1204650
bugzilla.suse.com/1204653
bugzilla.suse.com/1204693
bugzilla.suse.com/1204705
bugzilla.suse.com/1204719
bugzilla.suse.com/1204728
bugzilla.suse.com/1204753
bugzilla.suse.com/1204868
bugzilla.suse.com/1204926
bugzilla.suse.com/1204933
bugzilla.suse.com/1204934
bugzilla.suse.com/1204947
bugzilla.suse.com/1204957
bugzilla.suse.com/1204963
bugzilla.suse.com/1204970
www.suse.com/security/cve/CVE-2022-1882
www.suse.com/security/cve/CVE-2022-2153
www.suse.com/security/cve/CVE-2022-28748
www.suse.com/security/cve/CVE-2022-2964
www.suse.com/security/cve/CVE-2022-2978
www.suse.com/security/cve/CVE-2022-3169
www.suse.com/security/cve/CVE-2022-33981
www.suse.com/security/cve/CVE-2022-3424
www.suse.com/security/cve/CVE-2022-3435
www.suse.com/security/cve/CVE-2022-3521
www.suse.com/security/cve/CVE-2022-3524
www.suse.com/security/cve/CVE-2022-3526
www.suse.com/security/cve/CVE-2022-3535
www.suse.com/security/cve/CVE-2022-3542
www.suse.com/security/cve/CVE-2022-3545
www.suse.com/security/cve/CVE-2022-3565
www.suse.com/security/cve/CVE-2022-3577
www.suse.com/security/cve/CVE-2022-3586
www.suse.com/security/cve/CVE-2022-3594
www.suse.com/security/cve/CVE-2022-3619
www.suse.com/security/cve/CVE-2022-3621
www.suse.com/security/cve/CVE-2022-3625
www.suse.com/security/cve/CVE-2022-3628
www.suse.com/security/cve/CVE-2022-3629
www.suse.com/security/cve/CVE-2022-3633
www.suse.com/security/cve/CVE-2022-3640
www.suse.com/security/cve/CVE-2022-3646
www.suse.com/security/cve/CVE-2022-3649
www.suse.com/security/cve/CVE-2022-40476
www.suse.com/security/cve/CVE-2022-40768
www.suse.com/security/cve/CVE-2022-41674
www.suse.com/security/cve/CVE-2022-42703
www.suse.com/security/cve/CVE-2022-42719
www.suse.com/security/cve/CVE-2022-42720
www.suse.com/security/cve/CVE-2022-42721
www.suse.com/security/cve/CVE-2022-42722
www.suse.com/security/cve/CVE-2022-43750