Mageia Security Advisory (MGASA-2024-0344) containing multiple CVE
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Mageia: Security Advisory (MGASA-2024-0345) | 4 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-1) | 18 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-3) | 23 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-4) | 21 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-2) | 19 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-2) | 10 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-1) | 7 Jan 202500:00 | – | openvas |
![]() | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2024:3984-1) | 14 Nov 202400:00 | – | openvas |
![]() | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2024:3986-1) | 14 Nov 202400:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1159) | 10 Feb 202500:00 | – | openvas |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.10.2024.0344");
script_cve_id("CVE-2023-52917", "CVE-2024-47670", "CVE-2024-47671", "CVE-2024-47672", "CVE-2024-47673", "CVE-2024-47675", "CVE-2024-47678", "CVE-2024-47679", "CVE-2024-47681", "CVE-2024-47682", "CVE-2024-47683", "CVE-2024-47684", "CVE-2024-47685", "CVE-2024-47686", "CVE-2024-47688", "CVE-2024-47689", "CVE-2024-47690", "CVE-2024-47691", "CVE-2024-47692", "CVE-2024-47693", "CVE-2024-47695", "CVE-2024-47696", "CVE-2024-47697", "CVE-2024-47698", "CVE-2024-47699", "CVE-2024-47700", "CVE-2024-47701", "CVE-2024-47704", "CVE-2024-47705", "CVE-2024-47706", "CVE-2024-47707", "CVE-2024-47709", "CVE-2024-47710", "CVE-2024-47712", "CVE-2024-47713", "CVE-2024-47714", "CVE-2024-47715", "CVE-2024-47716", "CVE-2024-47718", "CVE-2024-47719", "CVE-2024-47720", "CVE-2024-47722", "CVE-2024-47723", "CVE-2024-47725", "CVE-2024-47727", "CVE-2024-47728", "CVE-2024-47730", "CVE-2024-47731", "CVE-2024-47734", "CVE-2024-47735", "CVE-2024-47737", "CVE-2024-47738", "CVE-2024-47739", "CVE-2024-47740", "CVE-2024-47741", "CVE-2024-47742", "CVE-2024-47743", "CVE-2024-47744", "CVE-2024-47745", "CVE-2024-47747", "CVE-2024-47748", "CVE-2024-47749", "CVE-2024-47750", "CVE-2024-47751", "CVE-2024-47752", "CVE-2024-47753", "CVE-2024-47754", "CVE-2024-47755", "CVE-2024-47756", "CVE-2024-47757", "CVE-2024-49850", "CVE-2024-49851", "CVE-2024-49852", "CVE-2024-49853", "CVE-2024-49855", "CVE-2024-49856", "CVE-2024-49858", "CVE-2024-49859", "CVE-2024-49860", "CVE-2024-49861", "CVE-2024-49862", "CVE-2024-49863", "CVE-2024-49864", "CVE-2024-49866", "CVE-2024-49867", "CVE-2024-49868", "CVE-2024-49870", "CVE-2024-49871", "CVE-2024-49874", "CVE-2024-49875", "CVE-2024-49877", "CVE-2024-49878", "CVE-2024-49879", "CVE-2024-49881", "CVE-2024-49882", "CVE-2024-49883", "CVE-2024-49884", "CVE-2024-49886", "CVE-2024-49889", "CVE-2024-49890", "CVE-2024-49892", "CVE-2024-49894", "CVE-2024-49895", "CVE-2024-49896", "CVE-2024-49900", "CVE-2024-49901", "CVE-2024-49902", "CVE-2024-49903", "CVE-2024-49905", "CVE-2024-49907", "CVE-2024-49912", "CVE-2024-49913", "CVE-2024-49924", "CVE-2024-49925", "CVE-2024-49927", "CVE-2024-49929", "CVE-2024-49930", "CVE-2024-49931", "CVE-2024-49933", "CVE-2024-49935", "CVE-2024-49936", "CVE-2024-49937", "CVE-2024-49938", "CVE-2024-49939", "CVE-2024-49944", "CVE-2024-49946", "CVE-2024-49947", "CVE-2024-49948", "CVE-2024-49949", "CVE-2024-49950", "CVE-2024-49951", "CVE-2024-49952", "CVE-2024-49953", "CVE-2024-49954", "CVE-2024-49955", "CVE-2024-49957", "CVE-2024-49958", "CVE-2024-49959", "CVE-2024-49960", "CVE-2024-49961", "CVE-2024-49962", "CVE-2024-49963", "CVE-2024-49965", "CVE-2024-49966", "CVE-2024-49967", "CVE-2024-49969", "CVE-2024-49973", "CVE-2024-49975", "CVE-2024-49976", "CVE-2024-49977", "CVE-2024-49978", "CVE-2024-49980", "CVE-2024-49981", "CVE-2024-49982", "CVE-2024-49983", "CVE-2024-49985", "CVE-2024-49986", "CVE-2024-49987", "CVE-2024-49988", "CVE-2024-49989", "CVE-2024-49991", "CVE-2024-49992", "CVE-2024-49993", "CVE-2024-49995", "CVE-2024-49996", "CVE-2024-49997", "CVE-2024-50000", "CVE-2024-50001", "CVE-2024-50002", "CVE-2024-50003", "CVE-2024-50005", "CVE-2024-50006", "CVE-2024-50007", "CVE-2024-50008", "CVE-2024-50012", "CVE-2024-50013", "CVE-2024-50015", "CVE-2024-50016", "CVE-2024-50019", "CVE-2024-50022", "CVE-2024-50023", "CVE-2024-50024", "CVE-2024-50026", "CVE-2024-50029", "CVE-2024-50031", "CVE-2024-50032", "CVE-2024-50033", "CVE-2024-50035", "CVE-2024-50036", "CVE-2024-50038", "CVE-2024-50039", "CVE-2024-50040", "CVE-2024-50041", "CVE-2024-50044", "CVE-2024-50045", "CVE-2024-50046", "CVE-2024-50047", "CVE-2024-50048", "CVE-2024-50049", "CVE-2024-50055", "CVE-2024-50057", "CVE-2024-50058", "CVE-2024-50059", "CVE-2024-50060", "CVE-2024-50061", "CVE-2024-50062", "CVE-2024-50063", "CVE-2024-50064", "CVE-2024-50065", "CVE-2024-50066");
script_tag(name:"creation_date", value:"2024-11-04 04:11:34 +0000 (Mon, 04 Nov 2024)");
script_version("2024-11-05T05:05:33+0000");
script_tag(name:"last_modification", value:"2024-11-05 05:05:33 +0000 (Tue, 05 Nov 2024)");
script_tag(name:"cvss_base", value:"9.4");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-10-23 15:19:06 +0000 (Wed, 23 Oct 2024)");
script_name("Mageia: Security Advisory (MGASA-2024-0344)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Mageia Linux Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA9");
script_xref(name:"Advisory-ID", value:"MGASA-2024-0344");
script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2024-0344.html");
script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=33669");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.53");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.54");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.55");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.56");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.57");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.58");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel-linus' package(s) announced via the MGASA-2024-0344 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Vanilla upstream kernel version 6.6.58 fixes bugs and vulnerabilities.
For information about the vulnerabilities see the links.");
script_tag(name:"affected", value:"'kernel-linus' package(s) on Mageia 9.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "MAGEIA9") {
if(!isnull(res = isrpmvuln(pkg:"kernel-linus", rpm:"kernel-linus~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-devel", rpm:"kernel-linus-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-devel-latest", rpm:"kernel-linus-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-doc", rpm:"kernel-linus-doc~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-latest", rpm:"kernel-linus-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-linus-source", rpm:"kernel-linus-source~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo