CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.3%
The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2802-1 advisory.
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).
- CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438).
- CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779).
- CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731).
- CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740).
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589).
- CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719).
- CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).
- CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803).
- CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:2802-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(205163);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/09");
script_cve_id(
"CVE-2023-38417",
"CVE-2023-47210",
"CVE-2023-51780",
"CVE-2023-52435",
"CVE-2023-52472",
"CVE-2023-52751",
"CVE-2023-52775",
"CVE-2024-25741",
"CVE-2024-26615",
"CVE-2024-26623",
"CVE-2024-26633",
"CVE-2024-26635",
"CVE-2024-26636",
"CVE-2024-26641",
"CVE-2024-26663",
"CVE-2024-26665",
"CVE-2024-26691",
"CVE-2024-26734",
"CVE-2024-26785",
"CVE-2024-26826",
"CVE-2024-26863",
"CVE-2024-26944",
"CVE-2024-27012",
"CVE-2024-27015",
"CVE-2024-27016",
"CVE-2024-27019",
"CVE-2024-27020",
"CVE-2024-27025",
"CVE-2024-27064",
"CVE-2024-27065",
"CVE-2024-27402",
"CVE-2024-27404",
"CVE-2024-35805",
"CVE-2024-35853",
"CVE-2024-35854",
"CVE-2024-35890",
"CVE-2024-35893",
"CVE-2024-35899",
"CVE-2024-35908",
"CVE-2024-35934",
"CVE-2024-35942",
"CVE-2024-36003",
"CVE-2024-36004",
"CVE-2024-36889",
"CVE-2024-36901",
"CVE-2024-36902",
"CVE-2024-36909",
"CVE-2024-36910",
"CVE-2024-36911",
"CVE-2024-36912",
"CVE-2024-36913",
"CVE-2024-36914",
"CVE-2024-36922",
"CVE-2024-36930",
"CVE-2024-36940",
"CVE-2024-36941",
"CVE-2024-36942",
"CVE-2024-36944",
"CVE-2024-36946",
"CVE-2024-36947",
"CVE-2024-36949",
"CVE-2024-36950",
"CVE-2024-36951",
"CVE-2024-36955",
"CVE-2024-36959",
"CVE-2024-36974",
"CVE-2024-38558",
"CVE-2024-38586",
"CVE-2024-38598",
"CVE-2024-38604",
"CVE-2024-38659",
"CVE-2024-39276",
"CVE-2024-39468",
"CVE-2024-39472",
"CVE-2024-39473",
"CVE-2024-39474",
"CVE-2024-39475",
"CVE-2024-39479",
"CVE-2024-39481",
"CVE-2024-39482",
"CVE-2024-39487",
"CVE-2024-39490",
"CVE-2024-39494",
"CVE-2024-39496",
"CVE-2024-39498",
"CVE-2024-39502",
"CVE-2024-39504",
"CVE-2024-39507",
"CVE-2024-40901",
"CVE-2024-40906",
"CVE-2024-40908",
"CVE-2024-40919",
"CVE-2024-40923",
"CVE-2024-40925",
"CVE-2024-40928",
"CVE-2024-40931",
"CVE-2024-40935",
"CVE-2024-40937",
"CVE-2024-40940",
"CVE-2024-40947",
"CVE-2024-40948",
"CVE-2024-40953",
"CVE-2024-40960",
"CVE-2024-40961",
"CVE-2024-40966",
"CVE-2024-40970",
"CVE-2024-40972",
"CVE-2024-40975",
"CVE-2024-40979",
"CVE-2024-40998",
"CVE-2024-40999",
"CVE-2024-41006",
"CVE-2024-41011",
"CVE-2024-41013",
"CVE-2024-41014",
"CVE-2024-41017",
"CVE-2024-41090",
"CVE-2024-41091"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:2802-1");
script_name(english:"SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2802-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are
affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2802-1 advisory.
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).
- CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438).
- CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779).
- CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731).
- CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740).
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589).
- CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted
(bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719).
- CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
(bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).
- CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803).
- CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
(bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215199");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218442");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219832");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220138");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220427");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220430");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221057");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221654");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221656");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221659");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222326");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222438");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222463");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222768");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222779");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223010");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223021");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223731");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223740");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223778");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223804");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223806");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223807");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223815");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223863");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224414");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224422");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224490");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224499");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224512");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224544");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224604");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224641");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224743");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225088");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225172");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225272");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225600");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225711");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225717");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225746");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225805");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225830");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225835");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225839");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225840");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225843");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225851");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225856");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225894");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225895");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225896");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226202");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226213");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226502");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226519");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226750");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227103");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227149");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227282");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227362");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227363");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227383");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227433");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227434");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227443");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227446");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227447");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227573");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227716");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227723");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227736");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227755");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227762");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227763");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227779");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227786");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227789");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227797");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227800");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227801");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227803");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227806");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227814");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227855");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227862");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227899");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227910");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227913");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227926");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228090");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228192");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228193");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228211");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228269");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228289");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228327");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228403");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228405");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228408");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228417");
# https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1ac05c5f");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-38417");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-47210");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-51780");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52435");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52472");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52751");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52775");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-25741");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26615");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26623");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26633");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26636");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26641");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26663");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26665");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26691");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26734");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26785");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26826");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26944");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27012");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27015");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27016");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27019");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27020");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27025");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27064");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27065");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27402");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27404");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35805");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35853");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35854");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35890");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35893");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35899");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35908");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35942");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36003");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36004");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36889");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36902");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36909");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36910");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36911");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36912");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36913");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36914");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36922");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36941");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36942");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36944");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36946");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36947");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36949");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36950");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36951");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36955");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36959");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36974");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38558");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38598");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38604");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38659");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39276");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39468");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39472");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39473");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39474");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39475");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39479");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39481");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39482");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39487");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39490");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39494");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39496");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39498");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39502");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39504");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39507");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40906");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40908");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40919");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40923");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40925");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40928");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40935");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40937");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40947");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40948");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40953");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40960");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40961");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40966");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40970");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40972");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40975");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40979");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40998");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40999");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41006");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41011");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41013");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41014");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41017");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41090");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41091");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-41011");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/12/25");
script_set_attribute(attribute:"patch_publication_date", value:"2024/08/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_23_17-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-zfcpdump");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES|SUSE)") audit(AUDIT_OS_NOT, "SUSE / openSUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+|SUSE([\d.]+))", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE / openSUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15|SUSE15\.6)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15', 'SUSE / openSUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE / openSUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED15" && (! preg(pattern:"^(6)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED15 SP6", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP15" && (! preg(pattern:"^(6)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP15 SP6", os_ver + " SP" + service_pack);
if (os_ver == "SLES15" && (! preg(pattern:"^(6)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP6", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(6)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP6", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-64kb-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-64kb-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-64kb-devel-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-64kb-devel-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'x86_64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-extra-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'x86_64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-default-extra-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-macros-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-macros-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-obs-build-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-obs-build-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-source-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-source-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-syms-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-syms-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-zfcpdump-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'s390x', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-zfcpdump-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'s390x', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'reiserfs-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.6']},
{'reference':'kernel-64kb-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-64kb-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-64kb-devel-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-64kb-devel-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'sp':'6', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-macros-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-macros-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-obs-build-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-obs-build-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-source-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-source-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-syms-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-syms-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-development-tools-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-zfcpdump-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'s390x', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-zfcpdump-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'s390x', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-basesystem-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'reiserfs-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.6', 'sle-module-legacy-release-15.6', 'sles-release-15.6']},
{'reference':'cluster-md-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'cluster-md-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dlm-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dlm-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-allwinner-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-altera-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-amazon-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-amd-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-amlogic-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-apm-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-apple-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-arm-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-broadcom-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-cavium-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-exynos-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-freescale-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-hisilicon-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-lg-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-marvell-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-mediatek-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-nvidia-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-qcom-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-renesas-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-rockchip-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-socionext-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-sprd-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'dtb-xilinx-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'gfs2-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'gfs2-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-64kb-devel-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-64kb-extra-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-64kb-livepatch-devel-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-64kb-optional-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-debug-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-debug-devel-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-debug-livepatch-devel-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-debug-vdso-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-base-6.4.0-150600.23.17.1.150600.12.6.2', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-base-rebuild-6.4.0-150600.23.17.1.150600.12.6.2', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-base-rebuild-6.4.0-150600.23.17.1.150600.12.6.2', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-devel-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-extra-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-livepatch-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-livepatch-devel-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-optional-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-default-vdso-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-devel-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-devel-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-devel-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-kvmsmall-vdso-6.4.0-150600.23.17.1', 'cpu':'x86_64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-macros-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-obs-build-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-obs-qa-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-source-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-source-vanilla-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-syms-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kernel-zfcpdump-6.4.0-150600.23.17.1', 'cpu':'s390x', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kselftests-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'kselftests-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'ocfs2-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'ocfs2-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'reiserfs-kmp-64kb-6.4.0-150600.23.17.1', 'cpu':'aarch64', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'reiserfs-kmp-default-6.4.0-150600.23.17.1', 'release':'SUSE15.6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.6']},
{'reference':'cluster-md-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.6']},
{'reference':'dlm-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.6']},
{'reference':'gfs2-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.6']},
{'reference':'ocfs2-kmp-default-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.6']},
{'reference':'kernel-default-livepatch-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.6']},
{'reference':'kernel-default-livepatch-devel-6.4.0-150600.23.17.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.6']},
{'reference':'kernel-livepatch-6_4_0-150600_23_17-default-1-150600.13.3.1', 'sp':'6', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.6']},
{'reference':'kernel-default-extra-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.6', 'sled-release-15.6', 'sles-release-15.6']},
{'reference':'kernel-default-extra-6.4.0-150600.23.17.1', 'sp':'6', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.6', 'sled-release-15.6', 'sles-release-15.6']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-64kb / cluster-md-kmp-default / dlm-kmp-64kb / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27012
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27404
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35908
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36003
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36949
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38604
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40948
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
www.nessus.org/u?1ac05c5f
bugzilla.suse.com/1194869
bugzilla.suse.com/1215199
bugzilla.suse.com/1215587
bugzilla.suse.com/1218442
bugzilla.suse.com/1218730
bugzilla.suse.com/1218820
bugzilla.suse.com/1219832
bugzilla.suse.com/1220138
bugzilla.suse.com/1220427
bugzilla.suse.com/1220430
bugzilla.suse.com/1220942
bugzilla.suse.com/1221057
bugzilla.suse.com/1221647
bugzilla.suse.com/1221654
bugzilla.suse.com/1221656
bugzilla.suse.com/1221659
bugzilla.suse.com/1222326
bugzilla.suse.com/1222328
bugzilla.suse.com/1222438
bugzilla.suse.com/1222463
bugzilla.suse.com/1222768
bugzilla.suse.com/1222775
bugzilla.suse.com/1222779
bugzilla.suse.com/1222893
bugzilla.suse.com/1223010
bugzilla.suse.com/1223021
bugzilla.suse.com/1223570
bugzilla.suse.com/1223731
bugzilla.suse.com/1223740
bugzilla.suse.com/1223778
bugzilla.suse.com/1223804
bugzilla.suse.com/1223806
bugzilla.suse.com/1223807
bugzilla.suse.com/1223813
bugzilla.suse.com/1223815
bugzilla.suse.com/1223836
bugzilla.suse.com/1223863
bugzilla.suse.com/1224414
bugzilla.suse.com/1224422
bugzilla.suse.com/1224490
bugzilla.suse.com/1224499
bugzilla.suse.com/1224512
bugzilla.suse.com/1224516
bugzilla.suse.com/1224544
bugzilla.suse.com/1224545
bugzilla.suse.com/1224589
bugzilla.suse.com/1224604
bugzilla.suse.com/1224636
bugzilla.suse.com/1224641
bugzilla.suse.com/1224743
bugzilla.suse.com/1224767
bugzilla.suse.com/1225088
bugzilla.suse.com/1225172
bugzilla.suse.com/1225272
bugzilla.suse.com/1225489
bugzilla.suse.com/1225600
bugzilla.suse.com/1225601
bugzilla.suse.com/1225711
bugzilla.suse.com/1225717
bugzilla.suse.com/1225719
bugzilla.suse.com/1225744
bugzilla.suse.com/1225745
bugzilla.suse.com/1225746
bugzilla.suse.com/1225752
bugzilla.suse.com/1225753
bugzilla.suse.com/1225757
bugzilla.suse.com/1225805
bugzilla.suse.com/1225810
bugzilla.suse.com/1225830
bugzilla.suse.com/1225835
bugzilla.suse.com/1225839
bugzilla.suse.com/1225840
bugzilla.suse.com/1225843
bugzilla.suse.com/1225847
bugzilla.suse.com/1225851
bugzilla.suse.com/1225856
bugzilla.suse.com/1225894
bugzilla.suse.com/1225895
bugzilla.suse.com/1225896
bugzilla.suse.com/1226202
bugzilla.suse.com/1226213
bugzilla.suse.com/1226502
bugzilla.suse.com/1226519
bugzilla.suse.com/1226750
bugzilla.suse.com/1226757
bugzilla.suse.com/1226783
bugzilla.suse.com/1226866
bugzilla.suse.com/1226883
bugzilla.suse.com/1226915
bugzilla.suse.com/1226993
bugzilla.suse.com/1227103
bugzilla.suse.com/1227149
bugzilla.suse.com/1227282
bugzilla.suse.com/1227362
bugzilla.suse.com/1227363
bugzilla.suse.com/1227383
bugzilla.suse.com/1227432
bugzilla.suse.com/1227433
bugzilla.suse.com/1227434
bugzilla.suse.com/1227435
bugzilla.suse.com/1227443
bugzilla.suse.com/1227446
bugzilla.suse.com/1227447
bugzilla.suse.com/1227487
bugzilla.suse.com/1227573
bugzilla.suse.com/1227626
bugzilla.suse.com/1227716
bugzilla.suse.com/1227719
bugzilla.suse.com/1227723
bugzilla.suse.com/1227730
bugzilla.suse.com/1227736
bugzilla.suse.com/1227755
bugzilla.suse.com/1227757
bugzilla.suse.com/1227762
bugzilla.suse.com/1227763
bugzilla.suse.com/1227779
bugzilla.suse.com/1227780
bugzilla.suse.com/1227783
bugzilla.suse.com/1227786
bugzilla.suse.com/1227788
bugzilla.suse.com/1227789
bugzilla.suse.com/1227797
bugzilla.suse.com/1227800
bugzilla.suse.com/1227801
bugzilla.suse.com/1227803
bugzilla.suse.com/1227806
bugzilla.suse.com/1227813
bugzilla.suse.com/1227814
bugzilla.suse.com/1227836
bugzilla.suse.com/1227855
bugzilla.suse.com/1227862
bugzilla.suse.com/1227866
bugzilla.suse.com/1227886
bugzilla.suse.com/1227899
bugzilla.suse.com/1227910
bugzilla.suse.com/1227913
bugzilla.suse.com/1227926
bugzilla.suse.com/1228090
bugzilla.suse.com/1228192
bugzilla.suse.com/1228193
bugzilla.suse.com/1228211
bugzilla.suse.com/1228269
bugzilla.suse.com/1228289
bugzilla.suse.com/1228327
bugzilla.suse.com/1228328
bugzilla.suse.com/1228403
bugzilla.suse.com/1228405
bugzilla.suse.com/1228408
bugzilla.suse.com/1228417
www.suse.com/security/cve/CVE-2023-38417
www.suse.com/security/cve/CVE-2023-47210
www.suse.com/security/cve/CVE-2023-51780
www.suse.com/security/cve/CVE-2023-52435
www.suse.com/security/cve/CVE-2023-52472
www.suse.com/security/cve/CVE-2023-52751
www.suse.com/security/cve/CVE-2023-52775
www.suse.com/security/cve/CVE-2024-25741
www.suse.com/security/cve/CVE-2024-26615
www.suse.com/security/cve/CVE-2024-26623
www.suse.com/security/cve/CVE-2024-26633
www.suse.com/security/cve/CVE-2024-26635
www.suse.com/security/cve/CVE-2024-26636
www.suse.com/security/cve/CVE-2024-26641
www.suse.com/security/cve/CVE-2024-26663
www.suse.com/security/cve/CVE-2024-26665
www.suse.com/security/cve/CVE-2024-26691
www.suse.com/security/cve/CVE-2024-26734
www.suse.com/security/cve/CVE-2024-26785
www.suse.com/security/cve/CVE-2024-26826
www.suse.com/security/cve/CVE-2024-26863
www.suse.com/security/cve/CVE-2024-26944
www.suse.com/security/cve/CVE-2024-27012
www.suse.com/security/cve/CVE-2024-27015
www.suse.com/security/cve/CVE-2024-27016
www.suse.com/security/cve/CVE-2024-27019
www.suse.com/security/cve/CVE-2024-27020
www.suse.com/security/cve/CVE-2024-27025
www.suse.com/security/cve/CVE-2024-27064
www.suse.com/security/cve/CVE-2024-27065
www.suse.com/security/cve/CVE-2024-27402
www.suse.com/security/cve/CVE-2024-27404
www.suse.com/security/cve/CVE-2024-35805
www.suse.com/security/cve/CVE-2024-35853
www.suse.com/security/cve/CVE-2024-35854
www.suse.com/security/cve/CVE-2024-35890
www.suse.com/security/cve/CVE-2024-35893
www.suse.com/security/cve/CVE-2024-35899
www.suse.com/security/cve/CVE-2024-35908
www.suse.com/security/cve/CVE-2024-35934
www.suse.com/security/cve/CVE-2024-35942
www.suse.com/security/cve/CVE-2024-36003
www.suse.com/security/cve/CVE-2024-36004
www.suse.com/security/cve/CVE-2024-36889
www.suse.com/security/cve/CVE-2024-36901
www.suse.com/security/cve/CVE-2024-36902
www.suse.com/security/cve/CVE-2024-36909
www.suse.com/security/cve/CVE-2024-36910
www.suse.com/security/cve/CVE-2024-36911
www.suse.com/security/cve/CVE-2024-36912
www.suse.com/security/cve/CVE-2024-36913
www.suse.com/security/cve/CVE-2024-36914
www.suse.com/security/cve/CVE-2024-36922
www.suse.com/security/cve/CVE-2024-36930
www.suse.com/security/cve/CVE-2024-36940
www.suse.com/security/cve/CVE-2024-36941
www.suse.com/security/cve/CVE-2024-36942
www.suse.com/security/cve/CVE-2024-36944
www.suse.com/security/cve/CVE-2024-36946
www.suse.com/security/cve/CVE-2024-36947
www.suse.com/security/cve/CVE-2024-36949
www.suse.com/security/cve/CVE-2024-36950
www.suse.com/security/cve/CVE-2024-36951
www.suse.com/security/cve/CVE-2024-36955
www.suse.com/security/cve/CVE-2024-36959
www.suse.com/security/cve/CVE-2024-36974
www.suse.com/security/cve/CVE-2024-38558
www.suse.com/security/cve/CVE-2024-38586
www.suse.com/security/cve/CVE-2024-38598
www.suse.com/security/cve/CVE-2024-38604
www.suse.com/security/cve/CVE-2024-38659
www.suse.com/security/cve/CVE-2024-39276
www.suse.com/security/cve/CVE-2024-39468
www.suse.com/security/cve/CVE-2024-39472
www.suse.com/security/cve/CVE-2024-39473
www.suse.com/security/cve/CVE-2024-39474
www.suse.com/security/cve/CVE-2024-39475
www.suse.com/security/cve/CVE-2024-39479
www.suse.com/security/cve/CVE-2024-39481
www.suse.com/security/cve/CVE-2024-39482
www.suse.com/security/cve/CVE-2024-39487
www.suse.com/security/cve/CVE-2024-39490
www.suse.com/security/cve/CVE-2024-39494
www.suse.com/security/cve/CVE-2024-39496
www.suse.com/security/cve/CVE-2024-39498
www.suse.com/security/cve/CVE-2024-39502
www.suse.com/security/cve/CVE-2024-39504
www.suse.com/security/cve/CVE-2024-39507
www.suse.com/security/cve/CVE-2024-40901
www.suse.com/security/cve/CVE-2024-40906
www.suse.com/security/cve/CVE-2024-40908
www.suse.com/security/cve/CVE-2024-40919
www.suse.com/security/cve/CVE-2024-40923
www.suse.com/security/cve/CVE-2024-40925
www.suse.com/security/cve/CVE-2024-40928
www.suse.com/security/cve/CVE-2024-40931
www.suse.com/security/cve/CVE-2024-40935
www.suse.com/security/cve/CVE-2024-40937
www.suse.com/security/cve/CVE-2024-40940
www.suse.com/security/cve/CVE-2024-40947
www.suse.com/security/cve/CVE-2024-40948
www.suse.com/security/cve/CVE-2024-40953
www.suse.com/security/cve/CVE-2024-40960
www.suse.com/security/cve/CVE-2024-40961
www.suse.com/security/cve/CVE-2024-40966
www.suse.com/security/cve/CVE-2024-40970
www.suse.com/security/cve/CVE-2024-40972
www.suse.com/security/cve/CVE-2024-40975
www.suse.com/security/cve/CVE-2024-40979
www.suse.com/security/cve/CVE-2024-40998
www.suse.com/security/cve/CVE-2024-40999
www.suse.com/security/cve/CVE-2024-41006
www.suse.com/security/cve/CVE-2024-41011
www.suse.com/security/cve/CVE-2024-41013
www.suse.com/security/cve/CVE-2024-41014
www.suse.com/security/cve/CVE-2024-41017
www.suse.com/security/cve/CVE-2024-41090
www.suse.com/security/cve/CVE-2024-41091
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.3%