Lucene search

K

Mageia: Security Advisory (MGASA-2024-0345)

🗓️ 04 Nov 2024 00:00:00Reported by Copyright (C) 2024 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 9 Views

Mageia 2024 security advisory for multiple CVE

Show more
Related
Refs
Code
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.10.2024.0345");
  script_cve_id("CVE-2023-52917", "CVE-2024-47670", "CVE-2024-47671", "CVE-2024-47672", "CVE-2024-47673", "CVE-2024-47675", "CVE-2024-47678", "CVE-2024-47679", "CVE-2024-47681", "CVE-2024-47682", "CVE-2024-47683", "CVE-2024-47684", "CVE-2024-47685", "CVE-2024-47686", "CVE-2024-47688", "CVE-2024-47689", "CVE-2024-47690", "CVE-2024-47691", "CVE-2024-47692", "CVE-2024-47693", "CVE-2024-47695", "CVE-2024-47696", "CVE-2024-47697", "CVE-2024-47698", "CVE-2024-47699", "CVE-2024-47700", "CVE-2024-47701", "CVE-2024-47704", "CVE-2024-47705", "CVE-2024-47706", "CVE-2024-47707", "CVE-2024-47709", "CVE-2024-47710", "CVE-2024-47712", "CVE-2024-47713", "CVE-2024-47714", "CVE-2024-47715", "CVE-2024-47716", "CVE-2024-47718", "CVE-2024-47719", "CVE-2024-47720", "CVE-2024-47722", "CVE-2024-47723", "CVE-2024-47725", "CVE-2024-47727", "CVE-2024-47728", "CVE-2024-47730", "CVE-2024-47731", "CVE-2024-47734", "CVE-2024-47735", "CVE-2024-47737", "CVE-2024-47738", "CVE-2024-47739", "CVE-2024-47740", "CVE-2024-47741", "CVE-2024-47742", "CVE-2024-47743", "CVE-2024-47744", "CVE-2024-47745", "CVE-2024-47747", "CVE-2024-47748", "CVE-2024-47749", "CVE-2024-47750", "CVE-2024-47751", "CVE-2024-47752", "CVE-2024-47753", "CVE-2024-47754", "CVE-2024-47755", "CVE-2024-47756", "CVE-2024-47757", "CVE-2024-49850", "CVE-2024-49851", "CVE-2024-49852", "CVE-2024-49853", "CVE-2024-49855", "CVE-2024-49856", "CVE-2024-49858", "CVE-2024-49859", "CVE-2024-49860", "CVE-2024-49861", "CVE-2024-49862", "CVE-2024-49863", "CVE-2024-49864", "CVE-2024-49866", "CVE-2024-49867", "CVE-2024-49868", "CVE-2024-49870", "CVE-2024-49871", "CVE-2024-49874", "CVE-2024-49875", "CVE-2024-49877", "CVE-2024-49878", "CVE-2024-49879", "CVE-2024-49881", "CVE-2024-49882", "CVE-2024-49883", "CVE-2024-49884", "CVE-2024-49886", "CVE-2024-49889", "CVE-2024-49890", "CVE-2024-49892", "CVE-2024-49894", "CVE-2024-49895", "CVE-2024-49896", "CVE-2024-49900", "CVE-2024-49901", "CVE-2024-49902", "CVE-2024-49903", "CVE-2024-49905", "CVE-2024-49907", "CVE-2024-49912", "CVE-2024-49913", "CVE-2024-49924", "CVE-2024-49925", "CVE-2024-49927", "CVE-2024-49929", "CVE-2024-49930", "CVE-2024-49931", "CVE-2024-49933", "CVE-2024-49935", "CVE-2024-49936", "CVE-2024-49937", "CVE-2024-49938", "CVE-2024-49939", "CVE-2024-49944", "CVE-2024-49946", "CVE-2024-49947", "CVE-2024-49948", "CVE-2024-49949", "CVE-2024-49950", "CVE-2024-49951", "CVE-2024-49952", "CVE-2024-49953", "CVE-2024-49954", "CVE-2024-49955", "CVE-2024-49957", "CVE-2024-49958", "CVE-2024-49959", "CVE-2024-49960", "CVE-2024-49961", "CVE-2024-49962", "CVE-2024-49963", "CVE-2024-49965", "CVE-2024-49966", "CVE-2024-49967", "CVE-2024-49969", "CVE-2024-49973", "CVE-2024-49975", "CVE-2024-49976", "CVE-2024-49977", "CVE-2024-49978", "CVE-2024-49980", "CVE-2024-49981", "CVE-2024-49982", "CVE-2024-49983", "CVE-2024-49985", "CVE-2024-49986", "CVE-2024-49987", "CVE-2024-49988", "CVE-2024-49989", "CVE-2024-49991", "CVE-2024-49992", "CVE-2024-49993", "CVE-2024-49995", "CVE-2024-49996", "CVE-2024-49997", "CVE-2024-50000", "CVE-2024-50001", "CVE-2024-50002", "CVE-2024-50003", "CVE-2024-50005", "CVE-2024-50006", "CVE-2024-50007", "CVE-2024-50008", "CVE-2024-50012", "CVE-2024-50013", "CVE-2024-50015", "CVE-2024-50016", "CVE-2024-50019", "CVE-2024-50022", "CVE-2024-50023", "CVE-2024-50024", "CVE-2024-50026", "CVE-2024-50029", "CVE-2024-50031", "CVE-2024-50032", "CVE-2024-50033", "CVE-2024-50035", "CVE-2024-50036", "CVE-2024-50038", "CVE-2024-50039", "CVE-2024-50040", "CVE-2024-50041", "CVE-2024-50044", "CVE-2024-50045", "CVE-2024-50046", "CVE-2024-50047", "CVE-2024-50048", "CVE-2024-50049", "CVE-2024-50055", "CVE-2024-50057", "CVE-2024-50058", "CVE-2024-50059", "CVE-2024-50060", "CVE-2024-50061", "CVE-2024-50062", "CVE-2024-50063", "CVE-2024-50064", "CVE-2024-50065", "CVE-2024-50066");
  script_tag(name:"creation_date", value:"2024-11-04 04:11:34 +0000 (Mon, 04 Nov 2024)");
  script_version("2024-11-05T05:05:33+0000");
  script_tag(name:"last_modification", value:"2024-11-05 05:05:33 +0000 (Tue, 05 Nov 2024)");
  script_tag(name:"cvss_base", value:"9.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-10-23 15:19:06 +0000 (Wed, 23 Oct 2024)");

  script_name("Mageia: Security Advisory (MGASA-2024-0345)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Mageia Linux Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA9");

  script_xref(name:"Advisory-ID", value:"MGASA-2024-0345");
  script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2024-0345.html");
  script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=33667");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.53");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.54");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.55");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.56");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.57");
  script_xref(name:"URL", value:"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.58");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel, kernel-firmware, kernel-firmware-nonfree, kmod-virtualbox, kmod-xtables-addons, radeon-firmware' package(s) announced via the MGASA-2024-0345 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"Upstream kernel version 6.6.58 fixes bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.");

  script_tag(name:"affected", value:"'kernel, kernel-firmware, kernel-firmware-nonfree, kmod-virtualbox, kmod-xtables-addons, radeon-firmware' package(s) on Mageia 9.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "MAGEIA9") {

  if(!isnull(res = isrpmvuln(pkg:"bpftool", rpm:"bpftool~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"cpupower", rpm:"cpupower~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"cpupower-devel", rpm:"cpupower-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"iwlwifi-firmware", rpm:"iwlwifi-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel", rpm:"kernel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop", rpm:"kernel-desktop~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-devel", rpm:"kernel-desktop-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-devel-latest", rpm:"kernel-desktop-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop-latest", rpm:"kernel-desktop-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586", rpm:"kernel-desktop586~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-devel", rpm:"kernel-desktop586-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-devel-latest", rpm:"kernel-desktop586-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-desktop586-latest", rpm:"kernel-desktop586-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~20240909~1.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-firmware-nonfree", rpm:"kernel-firmware-nonfree~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-server", rpm:"kernel-server~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-server-devel", rpm:"kernel-server-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-server-devel-latest", rpm:"kernel-server-devel-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-server-latest", rpm:"kernel-server-latest~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-userspace-headers", rpm:"kernel-userspace-headers~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kmod-virtualbox", rpm:"kmod-virtualbox~7.0.20~57.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kmod-xtables-addons", rpm:"kmod-xtables-addons~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"lib64bpf-devel", rpm:"lib64bpf-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"lib64bpf1", rpm:"lib64bpf1~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libbpf-devel", rpm:"libbpf-devel~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"libbpf1", rpm:"libbpf1~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"perf", rpm:"perf~6.6.58~2.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"radeon-firmware", rpm:"radeon-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"ralink-firmware", rpm:"ralink-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"rtlwifi-firmware", rpm:"rtlwifi-firmware~20240909~1.mga9.nonfree", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-6.6.58-desktop-2.mga9", rpm:"virtualbox-kernel-6.6.58-desktop-2.mga9~7.0.20~57.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-6.6.58-server-2.mga9", rpm:"virtualbox-kernel-6.6.58-server-2.mga9~7.0.20~57.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-desktop-latest", rpm:"virtualbox-kernel-desktop-latest~7.0.20~57.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"virtualbox-kernel-server-latest", rpm:"virtualbox-kernel-server-latest~7.0.20~57.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-desktop-2.mga9", rpm:"xtables-addons-kernel-6.6.58-desktop-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-desktop586-2.mga9", rpm:"xtables-addons-kernel-6.6.58-desktop586-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-6.6.58-server-2.mga9", rpm:"xtables-addons-kernel-6.6.58-server-2.mga9~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-desktop-latest", rpm:"xtables-addons-kernel-desktop-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-desktop586-latest", rpm:"xtables-addons-kernel-desktop586-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"xtables-addons-kernel-server-latest", rpm:"xtables-addons-kernel-server-latest~3.24~65.mga9", rls:"MAGEIA9"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Nov 2024 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS39.1
EPSS0.001
SSVC
9
.json
Report