The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4611-1 advisory.
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. (CVE-2019-3874)
The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.
(CVE-2020-26541)
A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS. (CVE-2021-4037)
An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured. (CVE-2022-2663)
A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
(CVE-2022-2964)
A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect. (CVE-2022-3169)
A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-3424)
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
The identifier VDB-211021 was assigned to this vulnerability. (CVE-2022-3524)
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088. (CVE-2022-3565)
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability. (CVE-2022-3567)
A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service. (CVE-2022-3586)
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
(CVE-2022-3594)
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920. (CVE-2022-3621)
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. (CVE-2022-3628)
A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. (CVE-2022-3629)
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability. (CVE-2022-3635)
A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability. (CVE-2022-3646)
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
The identifier of this vulnerability is VDB-211992. (CVE-2022-3649)
An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system. (CVE-2022-3903)
An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free. (CVE-2022-40307)
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
(CVE-2022-40768)
A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges. (CVE-2022-4095)
drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach. (CVE-2022-41848)
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress. (CVE-2022-41850)
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information. (CVE-2022-41858)
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
(CVE-2022-42703)
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user- space client to corrupt the monitor’s internal memory. (CVE-2022-43750)
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (CVE-2022-43945)
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. (CVE-2022-45934)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2022:4611-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(169291);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/14");
script_cve_id(
"CVE-2019-3874",
"CVE-2020-26541",
"CVE-2021-4037",
"CVE-2022-2663",
"CVE-2022-2964",
"CVE-2022-3169",
"CVE-2022-3424",
"CVE-2022-3524",
"CVE-2022-3542",
"CVE-2022-3565",
"CVE-2022-3567",
"CVE-2022-3586",
"CVE-2022-3594",
"CVE-2022-3621",
"CVE-2022-3628",
"CVE-2022-3629",
"CVE-2022-3635",
"CVE-2022-3646",
"CVE-2022-3649",
"CVE-2022-3903",
"CVE-2022-4095",
"CVE-2022-28748",
"CVE-2022-40307",
"CVE-2022-40768",
"CVE-2022-41848",
"CVE-2022-41850",
"CVE-2022-41858",
"CVE-2022-42703",
"CVE-2022-43750",
"CVE-2022-43945",
"CVE-2022-45934"
);
script_xref(name:"SuSE", value:"SUSE-SU-2022:4611-1");
script_name(english:"SUSE SLES12 Security Update : kernel (SUSE-SU-2022:4611-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in
the SUSE-SU-2022:4611-1 advisory.
- The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An
attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are
believed to be vulnerable. (CVE-2019-3874)
- The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database
(aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.
(CVE-2020-26541)
- A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that
allows local users to create files for the XFS file-system with an unintended group ownership and with
group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a
certain group and is writable by a user who is not a member of this group. This can lead to excessive
permissions granted in case when they should not. This vulnerability is similar to the previous
CVE-2018-13405 and adds the missed fix for the XFS. (CVE-2021-4037)
- An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and
incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted
IRC with nf_conntrack_irc configured. (CVE-2022-2663)
- A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet
Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
(CVE-2022-2964)
- A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request
of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting
in a PCIe link disconnect. (CVE-2022-3169)
- A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first
gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the
gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate
their privileges on the system. (CVE-2022-3424)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this
vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to
memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
The identifier VDB-211021 was assigned to this vulnerability. (CVE-2022-3524)
- A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue
is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The
manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier
of this vulnerability is VDB-211088. (CVE-2022-3565)
- A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects
the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to
race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier
assigned to this vulnerability. (CVE-2022-3567)
- A flaw was found in the Linux kernel's networking code. A use-after-free was found in the way the sch_sfb
enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed)
into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of
service. (CVE-2022-3586)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this
vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The
manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to
apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
(CVE-2022-3594)
- A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function
nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads
to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a
patch to fix this issue. The identifier of this vulnerability is VDB-211920. (CVE-2022-3621)
- A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs
when a user connects to a malicious USB device. This can allow a local user to crash the system or
escalate their privileges. (CVE-2022-3628)
- A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects
the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It
is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this
vulnerability. (CVE-2022-3629)
- A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue
is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation
leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the
identifier assigned to this vulnerability. (CVE-2022-3635)
- A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects
the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The
manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a
patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability. (CVE-2022-3646)
- A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function
nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after
free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
The identifier of this vulnerability is VDB-211992. (CVE-2022-3649)
- An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This
issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the
resources, causing denial of service or potentially crashing the system. (CVE-2022-3903)
- An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a
race condition with a resultant use-after-free. (CVE-2022-40307)
- drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information
from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
(CVE-2022-40768)
- A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in
drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and
gain escalation of privileges. (CVE-2022-4095)
- drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant
use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race
condition between mgslpc_ioctl and mgslpc_detach. (CVE-2022-41848)
- roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition
and resultant use-after-free in certain situations where a report is received while copying a
report->value is in progress. (CVE-2022-41850)
- A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in
progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to
crash the system or leak internal kernel information. (CVE-2022-41858)
- mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
(CVE-2022-42703)
- drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-
space client to corrupt the monitor's internal memory. (CVE-2022-43750)
- The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer
overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send
buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer
to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC
message with garbage data is still correctly formed according to the specification and is passed forward
to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the
allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (CVE-2022-43945)
- An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c
has an integer wraparound via L2CAP_CONF_REQ packets. (CVE-2022-45934)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1129898");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177282");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196018");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1198702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1201309");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202097");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203322");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204166");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204168");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204170");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204414");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204431");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204439");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204574");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204576");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204646");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205128");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205130");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205220");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206164");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-3874");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-26541");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-4037");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2663");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-28748");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3169");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3424");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3524");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3542");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3565");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3567");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3594");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3621");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3628");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3629");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3646");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3649");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3903");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-40307");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-40768");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-4095");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41848");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41850");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41858");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42703");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-43750");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-43945");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-45934");
# https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6e000d78");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-26541");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-45934");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/19");
script_set_attribute(attribute:"patch_publication_date", value:"2022/12/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/12/24");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES12', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-default-4.4.180-94.182.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-default-base-4.4.180-94.182.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-default-devel-4.4.180-94.182.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-devel-4.4.180-94.182.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-macros-4.4.180-94.182.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-source-4.4.180-94.182.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']},
{'reference':'kernel-syms-4.4.180-94.182.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-bcl-release-12.3']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-default / kernel-default-base / kernel-default-devel / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | kernel-default | p-cpe:/a:novell:suse_linux:kernel-default |
novell | suse_linux | kernel-default-base | p-cpe:/a:novell:suse_linux:kernel-default-base |
novell | suse_linux | kernel-default-devel | p-cpe:/a:novell:suse_linux:kernel-default-devel |
novell | suse_linux | kernel-devel | p-cpe:/a:novell:suse_linux:kernel-devel |
novell | suse_linux | kernel-macros | p-cpe:/a:novell:suse_linux:kernel-macros |
novell | suse_linux | kernel-source | p-cpe:/a:novell:suse_linux:kernel-source |
novell | suse_linux | kernel-syms | p-cpe:/a:novell:suse_linux:kernel-syms |
novell | suse_linux | 12 | cpe:/o:novell:suse_linux:12 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3542
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4095
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
www.nessus.org/u?6e000d78
bugzilla.suse.com/1129898
bugzilla.suse.com/1177282
bugzilla.suse.com/1196018
bugzilla.suse.com/1198702
bugzilla.suse.com/1201309
bugzilla.suse.com/1202097
bugzilla.suse.com/1202686
bugzilla.suse.com/1203008
bugzilla.suse.com/1203290
bugzilla.suse.com/1203322
bugzilla.suse.com/1203514
bugzilla.suse.com/1203960
bugzilla.suse.com/1203987
bugzilla.suse.com/1204166
bugzilla.suse.com/1204168
bugzilla.suse.com/1204170
bugzilla.suse.com/1204354
bugzilla.suse.com/1204402
bugzilla.suse.com/1204414
bugzilla.suse.com/1204431
bugzilla.suse.com/1204432
bugzilla.suse.com/1204439
bugzilla.suse.com/1204479
bugzilla.suse.com/1204574
bugzilla.suse.com/1204576
bugzilla.suse.com/1204631
bugzilla.suse.com/1204635
bugzilla.suse.com/1204636
bugzilla.suse.com/1204646
bugzilla.suse.com/1204647
bugzilla.suse.com/1204653
bugzilla.suse.com/1204868
bugzilla.suse.com/1205128
bugzilla.suse.com/1205130
bugzilla.suse.com/1205220
bugzilla.suse.com/1205514
bugzilla.suse.com/1205671
bugzilla.suse.com/1205796
bugzilla.suse.com/1206164
www.suse.com/security/cve/CVE-2019-3874
www.suse.com/security/cve/CVE-2020-26541
www.suse.com/security/cve/CVE-2021-4037
www.suse.com/security/cve/CVE-2022-2663
www.suse.com/security/cve/CVE-2022-28748
www.suse.com/security/cve/CVE-2022-2964
www.suse.com/security/cve/CVE-2022-3169
www.suse.com/security/cve/CVE-2022-3424
www.suse.com/security/cve/CVE-2022-3524
www.suse.com/security/cve/CVE-2022-3542
www.suse.com/security/cve/CVE-2022-3565
www.suse.com/security/cve/CVE-2022-3567
www.suse.com/security/cve/CVE-2022-3586
www.suse.com/security/cve/CVE-2022-3594
www.suse.com/security/cve/CVE-2022-3621
www.suse.com/security/cve/CVE-2022-3628
www.suse.com/security/cve/CVE-2022-3629
www.suse.com/security/cve/CVE-2022-3635
www.suse.com/security/cve/CVE-2022-3646
www.suse.com/security/cve/CVE-2022-3649
www.suse.com/security/cve/CVE-2022-3903
www.suse.com/security/cve/CVE-2022-40307
www.suse.com/security/cve/CVE-2022-40768
www.suse.com/security/cve/CVE-2022-4095
www.suse.com/security/cve/CVE-2022-41848
www.suse.com/security/cve/CVE-2022-41850
www.suse.com/security/cve/CVE-2022-41858
www.suse.com/security/cve/CVE-2022-42703
www.suse.com/security/cve/CVE-2022-43750
www.suse.com/security/cve/CVE-2022-43945
www.suse.com/security/cve/CVE-2022-45934