CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
16.7%
The remote SUSE Linux SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3251-1 advisory.
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-35965: Fix not validating setsockopt user input (bsc#1224579).
- CVE-2024-35933: Fixed build regression (bsc#1224640).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2024-43863: Fix a deadlock in dma buf fence polling (bsc#1229497)
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-43907: Fix the null pointer dereference in apply_state_adjust_rules (bsc#1229787).
- CVE-2024-43905: Fix the null pointer dereference for vega10_hwmgr (bsc#1229784).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2022-48910: Ensure we call ipv6_mc_down() at most once (bsc#1229632)
- CVE-2023-52893: Fix null-deref in gsmi_get_variable (bsc#1229535)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2022-48875: Initialize struct pn533_out_arg properly (bsc#1229516).
- CVE-2023-52907: Wait for out_urb's completion in pn533_usb_send_frame() (bsc#1229526).
- CVE-2024-43871: Fix memory leakage caused by driver API devm_free_percpu() (bsc#1229490)
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-43872: Fix soft lockup under heavy CEQE load (bsc#1229489)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42236: Prevent OOB read/write in usb_string_copy() (bsc#1228964).
- CVE-2024-42244: Fix crash on resume (bsc#1228967).
- CVE-2024-43879: Handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (bsc#1229482).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-41012: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
- CVE-2021-47341: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio (bsc#1224923).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2022-48769: Avoid EFIv2 runtime services on Apple x86 machines (bsc#1226629).
- CVE-2024-43856: Fix call order in dmam_free_coherent (bsc#1229346).
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-40984: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (bsc#1227820).
- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-42310: Fix null pointer dereference in cdv_intel_lvds_get_modes (bsc#1229358)
- CVE-2024-42309: Fix null pointer dereference in psb_intel_lvds_get_modes (bsc#1229359)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42285: Fix a use-after-free related to destroying CM IDs (bsc#1229381)
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-38618: Set lower bound of start tick time (bsc#1226754).
- CVE-2024-41035: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (bsc#1228485)
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2023-52708: Fix error handling in mmc_spi_probe() (bsc#1225483).
- CVE-2021-47549: Fix UAF in sata_fsl_port_stop when rmmod sata_fsl (bsc#1225508).
- CVE-2021-47373: Fix potential VPE leak on error (bsc#1225190).
- CVE-2021-47425: Fix resource leak in reconfiguration device addition (bsc#1225223).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-41098: Fix null pointer dereference on error (bsc#1228467).
- CVE-2021-4440: Drop USERGS_SYSRET64 paravirt call ( bsc#1227069).
- CVE-2022-48786: Remove vsock from connected table when connect is interrupted by a signal (bsc#1227996).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-35915: Fix uninit-value in nci_dev_up and nci_ntf_packet (bsc#1224479).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-42090: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (bsc#1228449).
- CVE-2024-42101: Fix null pointer dereference in nouveau_connector_get_modes (bsc#1228495).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2021-47257: fix null deref in parse dev addr (bsc#1224896).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:3251-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(207334);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/17");
script_cve_id(
"CVE-2021-4440",
"CVE-2021-47257",
"CVE-2021-47289",
"CVE-2021-47341",
"CVE-2021-47373",
"CVE-2021-47425",
"CVE-2021-47549",
"CVE-2022-48751",
"CVE-2022-48769",
"CVE-2022-48786",
"CVE-2022-48822",
"CVE-2022-48865",
"CVE-2022-48875",
"CVE-2022-48896",
"CVE-2022-48899",
"CVE-2022-48905",
"CVE-2022-48910",
"CVE-2022-48919",
"CVE-2022-48920",
"CVE-2022-48925",
"CVE-2022-48930",
"CVE-2022-48931",
"CVE-2022-48938",
"CVE-2023-2176",
"CVE-2023-52708",
"CVE-2023-52893",
"CVE-2023-52901",
"CVE-2023-52907",
"CVE-2024-26668",
"CVE-2024-26677",
"CVE-2024-26812",
"CVE-2024-26851",
"CVE-2024-27011",
"CVE-2024-35915",
"CVE-2024-35933",
"CVE-2024-35965",
"CVE-2024-36013",
"CVE-2024-36270",
"CVE-2024-36286",
"CVE-2024-38618",
"CVE-2024-38662",
"CVE-2024-39489",
"CVE-2024-40984",
"CVE-2024-41012",
"CVE-2024-41016",
"CVE-2024-41020",
"CVE-2024-41035",
"CVE-2024-41062",
"CVE-2024-41068",
"CVE-2024-41087",
"CVE-2024-41097",
"CVE-2024-41098",
"CVE-2024-42077",
"CVE-2024-42082",
"CVE-2024-42090",
"CVE-2024-42101",
"CVE-2024-42106",
"CVE-2024-42110",
"CVE-2024-42148",
"CVE-2024-42155",
"CVE-2024-42157",
"CVE-2024-42158",
"CVE-2024-42162",
"CVE-2024-42226",
"CVE-2024-42228",
"CVE-2024-42232",
"CVE-2024-42236",
"CVE-2024-42240",
"CVE-2024-42244",
"CVE-2024-42246",
"CVE-2024-42259",
"CVE-2024-42271",
"CVE-2024-42280",
"CVE-2024-42281",
"CVE-2024-42284",
"CVE-2024-42285",
"CVE-2024-42286",
"CVE-2024-42287",
"CVE-2024-42288",
"CVE-2024-42289",
"CVE-2024-42301",
"CVE-2024-42309",
"CVE-2024-42310",
"CVE-2024-42312",
"CVE-2024-42322",
"CVE-2024-43819",
"CVE-2024-43831",
"CVE-2024-43839",
"CVE-2024-43853",
"CVE-2024-43854",
"CVE-2024-43856",
"CVE-2024-43861",
"CVE-2024-43863",
"CVE-2024-43866",
"CVE-2024-43871",
"CVE-2024-43872",
"CVE-2024-43879",
"CVE-2024-43882",
"CVE-2024-43883",
"CVE-2024-43892",
"CVE-2024-43893",
"CVE-2024-43900",
"CVE-2024-43902",
"CVE-2024-43905",
"CVE-2024-43907"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:3251-1");
script_name(english:"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2024:3251-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12 host has packages installed that are affected by
multiple vulnerabilities as referenced in the SUSE-SU-2024:3251-1 advisory.
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-35965: Fix not validating setsockopt user input (bsc#1224579).
- CVE-2024-35933: Fixed build regression (bsc#1224640).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2024-43863: Fix a deadlock in dma buf fence polling (bsc#1229497)
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-43907: Fix the null pointer dereference in apply_state_adjust_rules (bsc#1229787).
- CVE-2024-43905: Fix the null pointer dereference for vega10_hwmgr (bsc#1229784).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2022-48910: Ensure we call ipv6_mc_down() at most once (bsc#1229632)
- CVE-2023-52893: Fix null-deref in gsmi_get_variable (bsc#1229535)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2022-48875: Initialize struct pn533_out_arg properly (bsc#1229516).
- CVE-2023-52907: Wait for out_urb's completion in pn533_usb_send_frame() (bsc#1229526).
- CVE-2024-43871: Fix memory leakage caused by driver API devm_free_percpu() (bsc#1229490)
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-43872: Fix soft lockup under heavy CEQE load (bsc#1229489)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB
(bsc#1228709).
- CVE-2024-42236: Prevent OOB read/write in usb_string_copy() (bsc#1228964).
- CVE-2024-42244: Fix crash on resume (bsc#1228967).
- CVE-2024-43879: Handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (bsc#1229482).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-41012: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
- CVE-2021-47341: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio (bsc#1224923).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2022-48769: Avoid EFIv2 runtime services on Apple x86 machines (bsc#1226629).
- CVE-2024-43856: Fix call order in dmam_free_coherent (bsc#1229346).
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-40984: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (bsc#1227820).
- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number')
(bsc#1222387)
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-42310: Fix null pointer dereference in cdv_intel_lvds_get_modes (bsc#1229358)
- CVE-2024-42309: Fix null pointer dereference in psb_intel_lvds_get_modes (bsc#1229359)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42285: Fix a use-after-free related to destroying CM IDs (bsc#1229381)
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-38618: Set lower bound of start tick time (bsc#1226754).
- CVE-2024-41035: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (bsc#1228485)
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2023-52708: Fix error handling in mmc_spi_probe() (bsc#1225483).
- CVE-2021-47549: Fix UAF in sata_fsl_port_stop when rmmod sata_fsl (bsc#1225508).
- CVE-2021-47373: Fix potential VPE leak on error (bsc#1225190).
- CVE-2021-47425: Fix resource leak in reconfiguration device addition (bsc#1225223).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-41098: Fix null pointer dereference on error (bsc#1228467).
- CVE-2021-4440: Drop USERGS_SYSRET64 paravirt call ( bsc#1227069).
- CVE-2022-48786: Remove vsock from connected table when connect is interrupted by a signal (bsc#1227996).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-35915: Fix uninit-value in nci_dev_up and nci_ntf_packet (bsc#1224479).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-42090: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (bsc#1228449).
- CVE-2024-42101: Fix null pointer dereference in nouveau_connector_get_modes (bsc#1228495).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2021-47257: fix null deref in parse dev addr (bsc#1224896).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1082555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190317");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205462");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1210629");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1214285");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1216834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221252");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222335");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222387");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222808");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223074");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223803");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224896");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224923");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224984");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225190");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225223");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225483");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225578");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226323");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226629");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226798");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226801");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226885");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227069");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227623");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228065");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228410");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228427");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228449");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228467");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228485");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228493");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228495");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228501");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228513");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228576");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228667");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228709");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228720");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228727");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228733");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228801");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228850");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228964");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229154");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229156");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229222");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229229");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229292");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229301");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229309");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229327");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229345");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229346");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229347");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229357");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229358");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229359");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229381");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229382");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229386");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229388");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229392");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229395");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229398");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229399");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229400");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229407");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229462");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229490");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229495");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229497");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229500");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229503");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229526");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229531");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229604");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229623");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229630");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229658");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229664");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229707");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229761");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229784");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229787");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1229851");
# https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c3b21fca");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-4440");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47257");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47289");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47341");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47373");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47425");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47549");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48751");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48769");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48786");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48822");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48865");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48875");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48896");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48899");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48905");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48910");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48919");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48920");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48925");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48938");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-2176");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52708");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52893");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52907");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26668");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26677");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26812");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26851");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27011");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35915");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35933");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35965");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36013");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36270");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36286");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38618");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38662");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39489");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40984");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41012");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41016");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41020");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41035");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41062");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41068");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41087");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41097");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41098");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42077");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42082");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42090");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42101");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42106");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42110");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42148");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42155");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42157");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42158");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42162");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42226");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42228");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42232");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42236");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42240");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42244");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42246");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42259");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42271");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42280");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42281");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42284");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42285");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42286");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42287");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42288");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42289");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42301");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42309");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42310");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42312");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42322");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43819");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43831");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43839");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43853");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43854");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43856");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43866");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43871");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43872");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43879");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43882");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43883");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43892");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43893");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43900");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43902");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43905");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-43907");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-43900");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/04");
script_set_attribute(attribute:"patch_publication_date", value:"2024/09/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/09/17");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-kgraft");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_228-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED12|SLED_SAP12|SLES12|SLES_SAP12)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP12 SP5", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-base-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-devel-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.228.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.228.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-man-4.12.14-122.228.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-devel-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-macros-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-obs-build-4.12.14-122.228.2', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-source-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-syms-4.12.14-122.228.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'cluster-md-kmp-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'dlm-kmp-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'gfs2-kmp-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'ocfs2-kmp-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'kernel-default-kgraft-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kernel-default-kgraft-devel-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kgraft-patch-4_12_14-122_228-default-1-8.3.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kernel-obs-build-4.12.14-122.228.2', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-sdk-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.228.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.228.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-base-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-devel-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-man-4.12.14-122.228.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-devel-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-macros-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-source-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-syms-4.12.14-122.228.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-default / dlm-kmp-default / gfs2-kmp-default / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47257
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48910
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48920
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26677
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36013
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42158
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907
www.nessus.org/u?c3b21fca
bugzilla.suse.com/1082555
bugzilla.suse.com/1190317
bugzilla.suse.com/1196516
bugzilla.suse.com/1205462
bugzilla.suse.com/1210629
bugzilla.suse.com/1214285
bugzilla.suse.com/1216834
bugzilla.suse.com/1221252
bugzilla.suse.com/1222335
bugzilla.suse.com/1222387
bugzilla.suse.com/1222808
bugzilla.suse.com/1223074
bugzilla.suse.com/1223803
bugzilla.suse.com/1224479
bugzilla.suse.com/1224579
bugzilla.suse.com/1224640
bugzilla.suse.com/1224896
bugzilla.suse.com/1224923
bugzilla.suse.com/1224984
bugzilla.suse.com/1225190
bugzilla.suse.com/1225223
bugzilla.suse.com/1225483
bugzilla.suse.com/1225508
bugzilla.suse.com/1225578
bugzilla.suse.com/1226323
bugzilla.suse.com/1226629
bugzilla.suse.com/1226653
bugzilla.suse.com/1226754
bugzilla.suse.com/1226798
bugzilla.suse.com/1226801
bugzilla.suse.com/1226885
bugzilla.suse.com/1227069
bugzilla.suse.com/1227623
bugzilla.suse.com/1227820
bugzilla.suse.com/1227996
bugzilla.suse.com/1228065
bugzilla.suse.com/1228247
bugzilla.suse.com/1228410
bugzilla.suse.com/1228427
bugzilla.suse.com/1228449
bugzilla.suse.com/1228466
bugzilla.suse.com/1228467
bugzilla.suse.com/1228482
bugzilla.suse.com/1228485
bugzilla.suse.com/1228487
bugzilla.suse.com/1228493
bugzilla.suse.com/1228495
bugzilla.suse.com/1228501
bugzilla.suse.com/1228513
bugzilla.suse.com/1228516
bugzilla.suse.com/1228576
bugzilla.suse.com/1228579
bugzilla.suse.com/1228667
bugzilla.suse.com/1228706
bugzilla.suse.com/1228709
bugzilla.suse.com/1228720
bugzilla.suse.com/1228727
bugzilla.suse.com/1228733
bugzilla.suse.com/1228801
bugzilla.suse.com/1228850
bugzilla.suse.com/1228959
bugzilla.suse.com/1228964
bugzilla.suse.com/1228966
bugzilla.suse.com/1228967
bugzilla.suse.com/1228982
bugzilla.suse.com/1228989
bugzilla.suse.com/1229154
bugzilla.suse.com/1229156
bugzilla.suse.com/1229222
bugzilla.suse.com/1229229
bugzilla.suse.com/1229290
bugzilla.suse.com/1229292
bugzilla.suse.com/1229301
bugzilla.suse.com/1229309
bugzilla.suse.com/1229327
bugzilla.suse.com/1229345
bugzilla.suse.com/1229346
bugzilla.suse.com/1229347
bugzilla.suse.com/1229357
bugzilla.suse.com/1229358
bugzilla.suse.com/1229359
bugzilla.suse.com/1229381
bugzilla.suse.com/1229382
bugzilla.suse.com/1229386
bugzilla.suse.com/1229388
bugzilla.suse.com/1229392
bugzilla.suse.com/1229395
bugzilla.suse.com/1229398
bugzilla.suse.com/1229399
bugzilla.suse.com/1229400
bugzilla.suse.com/1229407
bugzilla.suse.com/1229457
bugzilla.suse.com/1229462
bugzilla.suse.com/1229482
bugzilla.suse.com/1229489
bugzilla.suse.com/1229490
bugzilla.suse.com/1229495
bugzilla.suse.com/1229497
bugzilla.suse.com/1229500
bugzilla.suse.com/1229503
bugzilla.suse.com/1229516
bugzilla.suse.com/1229526
bugzilla.suse.com/1229531
bugzilla.suse.com/1229535
bugzilla.suse.com/1229536
bugzilla.suse.com/1229540
bugzilla.suse.com/1229604
bugzilla.suse.com/1229623
bugzilla.suse.com/1229624
bugzilla.suse.com/1229630
bugzilla.suse.com/1229632
bugzilla.suse.com/1229657
bugzilla.suse.com/1229658
bugzilla.suse.com/1229664
bugzilla.suse.com/1229707
bugzilla.suse.com/1229756
bugzilla.suse.com/1229759
bugzilla.suse.com/1229761
bugzilla.suse.com/1229767
bugzilla.suse.com/1229784
bugzilla.suse.com/1229787
bugzilla.suse.com/1229851
www.suse.com/security/cve/CVE-2021-4440
www.suse.com/security/cve/CVE-2021-47257
www.suse.com/security/cve/CVE-2021-47289
www.suse.com/security/cve/CVE-2021-47341
www.suse.com/security/cve/CVE-2021-47373
www.suse.com/security/cve/CVE-2021-47425
www.suse.com/security/cve/CVE-2021-47549
www.suse.com/security/cve/CVE-2022-48751
www.suse.com/security/cve/CVE-2022-48769
www.suse.com/security/cve/CVE-2022-48786
www.suse.com/security/cve/CVE-2022-48822
www.suse.com/security/cve/CVE-2022-48865
www.suse.com/security/cve/CVE-2022-48875
www.suse.com/security/cve/CVE-2022-48896
www.suse.com/security/cve/CVE-2022-48899
www.suse.com/security/cve/CVE-2022-48905
www.suse.com/security/cve/CVE-2022-48910
www.suse.com/security/cve/CVE-2022-48919
www.suse.com/security/cve/CVE-2022-48920
www.suse.com/security/cve/CVE-2022-48925
www.suse.com/security/cve/CVE-2022-48930
www.suse.com/security/cve/CVE-2022-48931
www.suse.com/security/cve/CVE-2022-48938
www.suse.com/security/cve/CVE-2023-2176
www.suse.com/security/cve/CVE-2023-52708
www.suse.com/security/cve/CVE-2023-52893
www.suse.com/security/cve/CVE-2023-52901
www.suse.com/security/cve/CVE-2023-52907
www.suse.com/security/cve/CVE-2024-26668
www.suse.com/security/cve/CVE-2024-26677
www.suse.com/security/cve/CVE-2024-26812
www.suse.com/security/cve/CVE-2024-26851
www.suse.com/security/cve/CVE-2024-27011
www.suse.com/security/cve/CVE-2024-35915
www.suse.com/security/cve/CVE-2024-35933
www.suse.com/security/cve/CVE-2024-35965
www.suse.com/security/cve/CVE-2024-36013
www.suse.com/security/cve/CVE-2024-36270
www.suse.com/security/cve/CVE-2024-36286
www.suse.com/security/cve/CVE-2024-38618
www.suse.com/security/cve/CVE-2024-38662
www.suse.com/security/cve/CVE-2024-39489
www.suse.com/security/cve/CVE-2024-40984
www.suse.com/security/cve/CVE-2024-41012
www.suse.com/security/cve/CVE-2024-41016
www.suse.com/security/cve/CVE-2024-41020
www.suse.com/security/cve/CVE-2024-41035
www.suse.com/security/cve/CVE-2024-41062
www.suse.com/security/cve/CVE-2024-41068
www.suse.com/security/cve/CVE-2024-41087
www.suse.com/security/cve/CVE-2024-41097
www.suse.com/security/cve/CVE-2024-41098
www.suse.com/security/cve/CVE-2024-42077
www.suse.com/security/cve/CVE-2024-42082
www.suse.com/security/cve/CVE-2024-42090
www.suse.com/security/cve/CVE-2024-42101
www.suse.com/security/cve/CVE-2024-42106
www.suse.com/security/cve/CVE-2024-42110
www.suse.com/security/cve/CVE-2024-42148
www.suse.com/security/cve/CVE-2024-42155
www.suse.com/security/cve/CVE-2024-42157
www.suse.com/security/cve/CVE-2024-42158
www.suse.com/security/cve/CVE-2024-42162
www.suse.com/security/cve/CVE-2024-42226
www.suse.com/security/cve/CVE-2024-42228
www.suse.com/security/cve/CVE-2024-42232
www.suse.com/security/cve/CVE-2024-42236
www.suse.com/security/cve/CVE-2024-42240
www.suse.com/security/cve/CVE-2024-42244
www.suse.com/security/cve/CVE-2024-42246
www.suse.com/security/cve/CVE-2024-42259
www.suse.com/security/cve/CVE-2024-42271
www.suse.com/security/cve/CVE-2024-42280
www.suse.com/security/cve/CVE-2024-42281
www.suse.com/security/cve/CVE-2024-42284
www.suse.com/security/cve/CVE-2024-42285
www.suse.com/security/cve/CVE-2024-42286
www.suse.com/security/cve/CVE-2024-42287
www.suse.com/security/cve/CVE-2024-42288
www.suse.com/security/cve/CVE-2024-42289
www.suse.com/security/cve/CVE-2024-42301
www.suse.com/security/cve/CVE-2024-42309
www.suse.com/security/cve/CVE-2024-42310
www.suse.com/security/cve/CVE-2024-42312
www.suse.com/security/cve/CVE-2024-42322
www.suse.com/security/cve/CVE-2024-43819
www.suse.com/security/cve/CVE-2024-43831
www.suse.com/security/cve/CVE-2024-43839
www.suse.com/security/cve/CVE-2024-43853
www.suse.com/security/cve/CVE-2024-43854
www.suse.com/security/cve/CVE-2024-43856
www.suse.com/security/cve/CVE-2024-43861
www.suse.com/security/cve/CVE-2024-43863
www.suse.com/security/cve/CVE-2024-43866
www.suse.com/security/cve/CVE-2024-43871
www.suse.com/security/cve/CVE-2024-43872
www.suse.com/security/cve/CVE-2024-43879
www.suse.com/security/cve/CVE-2024-43882
www.suse.com/security/cve/CVE-2024-43883
www.suse.com/security/cve/CVE-2024-43892
www.suse.com/security/cve/CVE-2024-43893
www.suse.com/security/cve/CVE-2024-43900
www.suse.com/security/cve/CVE-2024-43902
www.suse.com/security/cve/CVE-2024-43905
www.suse.com/security/cve/CVE-2024-43907