Mageia 2024 security advisory for multiple CVE
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Updated kernel-linus packages fix security vulnerabilities | 2 Nov 202419:56 | – | mageia |
![]() | Updated kernel, kmod-xtables-addons. kmod-virtualbox, kernel-firmware & kernel-firmware-nonfree radeon-firmware packages fix security vulnerabilities | 2 Nov 202419:56 | – | mageia |
![]() | Mageia: Security Advisory (MGASA-2024-0344) | 4 Nov 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-3) | 23 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-4) | 21 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-2) | 19 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7166-1) | 18 Dec 202400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-2) | 10 Jan 202500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-7186-1) | 7 Jan 202500:00 | – | openvas |
![]() | openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2024:3984-1) | 14 Nov 202400:00 | – | openvas |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.10.2024.0345");
script_cve_id("CVE-2023-52917", "CVE-2024-47670", "CVE-2024-47671", "CVE-2024-47672", "CVE-2024-47673", "CVE-2024-47675", "CVE-2024-47678", "CVE-2024-47679", "CVE-2024-47681", "CVE-2024-47682", "CVE-2024-47683", "CVE-2024-47684", "CVE-2024-47685", "CVE-2024-47686", "CVE-2024-47688", "CVE-2024-47689", "CVE-2024-47690", "CVE-2024-47691", "CVE-2024-47692", "CVE-2024-47693", "CVE-2024-47695", "CVE-2024-47696", "CVE-2024-47697", "CVE-2024-47698", "CVE-2024-47699", "CVE-2024-47700", "CVE-2024-47701", "CVE-2024-47704", "CVE-2024-47705", "CVE-2024-47706", "CVE-2024-47707", "CVE-2024-47709", "CVE-2024-47710", "CVE-2024-47712", "CVE-2024-47713", "CVE-2024-47714", "CVE-2024-47715", "CVE-2024-47716", "CVE-2024-47718", "CVE-2024-47719", "CVE-2024-47720", "CVE-2024-47722", "CVE-2024-47723", "CVE-2024-47725", "CVE-2024-47727", "CVE-2024-47728", "CVE-2024-47730", "CVE-2024-47731", "CVE-2024-47734", "CVE-2024-47735", "CVE-2024-47737", "CVE-2024-47738", "CVE-2024-47739", "CVE-2024-47740", "CVE-2024-47741", "CVE-2024-47742", "CVE-2024-47743", "CVE-2024-47744", "CVE-2024-47745", "CVE-2024-47747", "CVE-2024-47748", "CVE-2024-47749", "CVE-2024-47750", "CVE-2024-47751", "CVE-2024-47752", "CVE-2024-47753", "CVE-2024-47754", "CVE-2024-47755", "CVE-2024-47756", "CVE-2024-47757", "CVE-2024-49850", "CVE-2024-49851", "CVE-2024-49852", "CVE-2024-49853", "CVE-2024-49855", "CVE-2024-49856", "CVE-2024-49858", "CVE-2024-49859", "CVE-2024-49860", "CVE-2024-49861", "CVE-2024-49862", "CVE-2024-49863", "CVE-2024-49864", "CVE-2024-49866", "CVE-2024-49867", "CVE-2024-49868", "CVE-2024-49870", "CVE-2024-49871", "CVE-2024-49874", "CVE-2024-49875", "CVE-2024-49877", "CVE-2024-49878", "CVE-2024-49879", "CVE-2024-49881", "CVE-2024-49882", "CVE-2024-49883", "CVE-2024-49884", "CVE-2024-49886", "CVE-2024-49889", "CVE-2024-49890", "CVE-2024-49892", "CVE-2024-49894", "CVE-2024-49895", "CVE-2024-49896", "CVE-2024-49900", "CVE-2024-49901", "CVE-2024-49902", "CVE-2024-49903", "CVE-2024-49905", "CVE-2024-49907", "CVE-2024-49912", "CVE-2024-49913", "CVE-2024-49924", "CVE-2024-49925", "CVE-2024-49927", "CVE-2024-49929", "CVE-2024-49930", "CVE-2024-49931", "CVE-2024-49933", "CVE-2024-49935", "CVE-2024-49936", "CVE-2024-49937", "CVE-2024-49938", "CVE-2024-49939", "CVE-2024-49944", "CVE-2024-49946", "CVE-2024-49947", "CVE-2024-49948", "CVE-2024-49949", "CVE-2024-49950", "CVE-2024-49951", "CVE-2024-49952", "CVE-2024-49953", "CVE-2024-49954", "CVE-2024-49955", "CVE-2024-49957", "CVE-2024-49958", "CVE-2024-49959", "CVE-2024-49960", "CVE-2024-49961", "CVE-2024-49962", "CVE-2024-49963", "CVE-2024-49965", "CVE-2024-49966", "CVE-2024-49967", "CVE-2024-49969", "CVE-2024-49973", "CVE-2024-49975", "CVE-2024-49976", "CVE-2024-49977", "CVE-2024-49978", "CVE-2024-49980", "CVE-2024-49981", "CVE-2024-49982", "CVE-2024-49983", "CVE-2024-49985", "CVE-2024-49986", "CVE-2024-49987", "CVE-2024-49988", "CVE-2024-49989", "CVE-2024-49991", "CVE-2024-49992", "CVE-2024-49993", "CVE-2024-49995", "CVE-2024-49996", "CVE-2024-49997", "CVE-2024-50000", "CVE-2024-50001", "CVE-2024-50002", "CVE-2024-50003", "CVE-2024-50005", "CVE-2024-50006", "CVE-2024-50007", "CVE-2024-50008", "CVE-2024-50012", "CVE-2024-50013", "CVE-2024-50015", "CVE-2024-50016", "CVE-2024-50019", "CVE-2024-50022", "CVE-2024-50023", "CVE-2024-50024", "CVE-2024-50026", "CVE-2024-50029", "CVE-2024-50031", "CVE-2024-50032", "CVE-2024-50033", "CVE-2024-50035", "CVE-2024-50036", "CVE-2024-50038", "CVE-2024-50039", "CVE-2024-50040", "CVE-2024-50041", "CVE-2024-50044", "CVE-2024-50045", "CVE-2024-50046", "CVE-2024-50047", "CVE-2024-50048", "CVE-2024-50049", "CVE-2024-50055", "CVE-2024-50057", "CVE-2024-50058", "CVE-2024-50059", "CVE-2024-50060", "CVE-2024-50061", "CVE-2024-50062", "CVE-2024-50063", "CVE-2024-50064", "CVE-2024-50065", "CVE-2024-50066");
script_tag(name:"creation_date", value:"2024-11-04 04:11:34 +0000 (Mon, 04 Nov 2024)");
script_version("2024-11-05T05:05:33+0000");
script_tag(name:"last_modification", value:"2024-11-05 05:05:33 +0000 (Tue, 05 Nov 2024)");
script_tag(name:"cvss_base", value:"9.4");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-10-23 15:19:06 +0000 (Wed, 23 Oct 2024)");
script_name("Mageia: Security Advisory (MGASA-2024-0345)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Mageia Linux Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA9");
script_xref(name:"Advisory-ID", value:"MGASA-2024-0345");
script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2024-0345.html");
script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=33667");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.53");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.54");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.55");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.56");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.57");
script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.58");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel, kernel-firmware, kernel-firmware-nonfree, kmod-virtualbox, kmod-xtables-addons, radeon-firmware' package(s) announced via the MGASA-2024-0345 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Upstream kernel version 6.6.58 fixes bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.");
script_tag(name:"affected", value:"'kernel, kernel-firmware, kernel-firmware-nonfree, kmod-virtualbox, kmod-xtables-addons, radeon-firmware' package(s) on Mageia 9.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "MAGEIA9") {
if(!isnull(res = isrpmvuln(pkg:"bpftool", rpm:"bpftool~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"cpupower", rpm:"cpupower~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"cpupower-devel", rpm:"cpupower-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"iwlwifi-firmware", rpm:"iwlwifi-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel", rpm:"kernel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop", rpm:"kernel-desktop~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-devel", rpm:"kernel-desktop-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-devel-latest", rpm:"kernel-desktop-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-latest", rpm:"kernel-desktop-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586", rpm:"kernel-desktop586~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-devel", rpm:"kernel-desktop586-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-devel-latest", rpm:"kernel-desktop586-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-latest", rpm:"kernel-desktop586-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~20240909~1.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-firmware-nonfree", rpm:"kernel-firmware-nonfree~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-server", rpm:"kernel-server~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-server-devel", rpm:"kernel-server-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-server-devel-latest", rpm:"kernel-server-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-server-latest", rpm:"kernel-server-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-userspace-headers", rpm:"kernel-userspace-headers~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kmod-virtualbox", rpm:"kmod-virtualbox~7.0.20~57.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kmod-xtables-addons", rpm:"kmod-xtables-addons~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64bpf-devel", rpm:"lib64bpf-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"lib64bpf1", rpm:"lib64bpf1~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libbpf-devel", rpm:"libbpf-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libbpf1", rpm:"libbpf1~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"perf", rpm:"perf~6.6.58~2.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"radeon-firmware", rpm:"radeon-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ralink-firmware", rpm:"ralink-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"rtlwifi-firmware", rpm:"rtlwifi-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-6.6.58-desktop-2.mga9", rpm:"virtualbox-kernel-6.6.58-desktop-2.mga9~7.0.20~57.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-6.6.58-server-2.mga9", rpm:"virtualbox-kernel-6.6.58-server-2.mga9~7.0.20~57.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-desktop-latest", rpm:"virtualbox-kernel-desktop-latest~7.0.20~57.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-server-latest", rpm:"virtualbox-kernel-server-latest~7.0.20~57.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-desktop-2.mga9", rpm:"xtables-addons-kernel-6.6.58-desktop-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-desktop586-2.mga9", rpm:"xtables-addons-kernel-6.6.58-desktop586-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-server-2.mga9", rpm:"xtables-addons-kernel-6.6.58-server-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-desktop-latest", rpm:"xtables-addons-kernel-desktop-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-desktop586-latest", rpm:"xtables-addons-kernel-desktop586-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-server-latest", rpm:"xtables-addons-kernel-server-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo