Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:13614125623114202409751
HistoryMay 07, 2024 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2024:0975-1)

2024-05-0700:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
8
suse linux enterprise
security advisory
linux kernel
suse-su-2024:0975-1
cve-2024-26600
cve-2021-47078
cve-2021-47076
cve-2023-52605
cve-2023-52597
cve-2023-52574
cve-2023-52482
cve-2022-48627
cve-2023-28746
cve-2021-47077
cve-2023-35827
cve-2023-52532
cve-2021-33200
cve-2023-52530
cve-2023-52531

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

49.4%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2024.0975.1");
  script_cve_id("CVE-2019-25162", "CVE-2020-36777", "CVE-2020-36784", "CVE-2021-33200", "CVE-2021-46906", "CVE-2021-46915", "CVE-2021-46921", "CVE-2021-46924", "CVE-2021-46929", "CVE-2021-46932", "CVE-2021-46953", "CVE-2021-46974", "CVE-2021-46991", "CVE-2021-46992", "CVE-2021-47013", "CVE-2021-47054", "CVE-2021-47076", "CVE-2021-47077", "CVE-2021-47078", "CVE-2022-20154", "CVE-2022-48627", "CVE-2023-28746", "CVE-2023-35827", "CVE-2023-46343", "CVE-2023-52340", "CVE-2023-52429", "CVE-2023-52443", "CVE-2023-52445", "CVE-2023-52449", "CVE-2023-52451", "CVE-2023-52464", "CVE-2023-52475", "CVE-2023-52478", "CVE-2023-52482", "CVE-2023-52502", "CVE-2023-52530", "CVE-2023-52531", "CVE-2023-52532", "CVE-2023-52574", "CVE-2023-52597", "CVE-2023-52605", "CVE-2023-6356", "CVE-2023-6535", "CVE-2023-6536", "CVE-2024-0607", "CVE-2024-1151", "CVE-2024-23849", "CVE-2024-23851", "CVE-2024-26585", "CVE-2024-26595", "CVE-2024-26600", "CVE-2024-26622");
  script_tag(name:"creation_date", value:"2024-05-07 13:39:54 +0000 (Tue, 07 May 2024)");
  script_version("2024-05-09T05:05:43+0000");
  script_tag(name:"last_modification", value:"2024-05-09 05:05:43 +0000 (Thu, 09 May 2024)");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-04-17 20:03:39 +0000 (Wed, 17 Apr 2024)");

  script_name("SUSE: Security Advisory (SUSE-SU-2024:0975-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES12\.0SP5)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2024:0975-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2024/suse-su-20240975-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2024:0975-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:

CVE-2024-26600: Fixed NULL pointer dereference for SRP (bsc#1220340).
CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed (bsc#1220863)
CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was supplied (bsc#1220860)
CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735).
CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845).
CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
CVE-2021-47077: Fixed a NULL pointer dereference when in shost_data (bsc#1220861).
CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
CVE-2021-33200: Fixed a leakage of uninitialized bpf stack under speculation. (bsc#1186484)
CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
CVE-2023-52340: Fixed ICMPv6 'Packet Too Big' packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).
CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
CVE-2021-46921: Fixed ordering in queued_write_lock_slowpath (bsc#1220468).
CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)
CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
CVE-2021-46953: Fixed a corruption in interrupt mappings on watchdow probe failure (bsc#1220599).
CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)
CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails (bsc#1220570).
CVE-2021-47054: Fixed a bug to put child node before return (bsc#1220767).
CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)
CVE-2021-46915: Fixed a bug to avoid possible divide error in nft_limit_init (bsc#1220436).
CVE-2021-46906: Fixed an info leak in hid_submit_ctrl (bsc#1220421).
CVE-2023-52445: Fixed use after free on context disconnection ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'Linux Kernel' package(s) on SUSE Linux Enterprise High Performance Computing 12-SP5, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES12.0SP5") {

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure", rpm:"kernel-azure~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base", rpm:"kernel-azure-base~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base-debuginfo", rpm:"kernel-azure-base-debuginfo~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debuginfo", rpm:"kernel-azure-debuginfo~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debugsource", rpm:"kernel-azure-debugsource~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-devel", rpm:"kernel-azure-devel~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-devel-azure", rpm:"kernel-devel-azure~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-source-azure", rpm:"kernel-source-azure~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-syms-azure", rpm:"kernel-syms-azure~4.12.14~16.173.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

49.4%