Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:13614125623114202419791
HistoryJun 12, 2024 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2024:1979-1)

2024-06-1200:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
suse
security advisory
2024-1979-1
multiple cves
cvss 6.8

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.8%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2024.1979.1");
  script_cve_id("CVE-2021-46933", "CVE-2021-47074", "CVE-2021-47162", "CVE-2021-47171", "CVE-2021-47188", "CVE-2021-47206", "CVE-2021-47220", "CVE-2021-47229", "CVE-2021-47231", "CVE-2021-47235", "CVE-2021-47236", "CVE-2021-47237", "CVE-2021-47238", "CVE-2021-47239", "CVE-2021-47245", "CVE-2021-47246", "CVE-2021-47248", "CVE-2021-47249", "CVE-2021-47250", "CVE-2021-47252", "CVE-2021-47254", "CVE-2021-47258", "CVE-2021-47260", "CVE-2021-47261", "CVE-2021-47265", "CVE-2021-47269", "CVE-2021-47274", "CVE-2021-47276", "CVE-2021-47277", "CVE-2021-47280", "CVE-2021-47281", "CVE-2021-47284", "CVE-2021-47285", "CVE-2021-47288", "CVE-2021-47301", "CVE-2021-47302", "CVE-2021-47305", "CVE-2021-47307", "CVE-2021-47308", "CVE-2021-47310", "CVE-2021-47311", "CVE-2021-47314", "CVE-2021-47315", "CVE-2021-47319", "CVE-2021-47320", "CVE-2021-47321", "CVE-2021-47323", "CVE-2021-47324", "CVE-2021-47330", "CVE-2021-47334", "CVE-2021-47337", "CVE-2021-47343", "CVE-2021-47344", "CVE-2021-47345", "CVE-2021-47347", "CVE-2021-47352", "CVE-2021-47353", "CVE-2021-47355", "CVE-2021-47356", "CVE-2021-47357", "CVE-2021-47361", "CVE-2021-47362", "CVE-2021-47369", "CVE-2021-47375", "CVE-2021-47378", "CVE-2021-47382", "CVE-2021-47383", "CVE-2021-47391", "CVE-2021-47397", "CVE-2021-47400", "CVE-2021-47401", "CVE-2021-47404", "CVE-2021-47409", "CVE-2021-47416", "CVE-2021-47423", "CVE-2021-47424", "CVE-2021-47431", "CVE-2021-47435", "CVE-2021-47436", "CVE-2021-47456", "CVE-2021-47458", "CVE-2021-47460", "CVE-2021-47469", "CVE-2021-47472", "CVE-2021-47473", "CVE-2021-47478", "CVE-2021-47480", "CVE-2021-47483", "CVE-2021-47485", "CVE-2021-47495", "CVE-2021-47496", "CVE-2021-47497", "CVE-2021-47500", "CVE-2021-47506", "CVE-2021-47509", "CVE-2021-47511", "CVE-2021-47523", "CVE-2021-47541", "CVE-2021-47548", "CVE-2021-47565", "CVE-2022-48686", "CVE-2022-48697", "CVE-2022-48704", "CVE-2022-48708", "CVE-2022-48710", "CVE-2023-0160", "CVE-2023-1829", "CVE-2023-42755", "CVE-2023-47233", "CVE-2023-52527", "CVE-2023-52586", "CVE-2023-52591", "CVE-2023-52655", "CVE-2023-52664", "CVE-2023-52685", "CVE-2023-52686", "CVE-2023-52691", "CVE-2023-52696", "CVE-2023-52698", "CVE-2023-52703", "CVE-2023-52730", "CVE-2023-52732", "CVE-2023-52741", "CVE-2023-52742", "CVE-2023-52747", "CVE-2023-52759", "CVE-2023-52774", "CVE-2023-52781", "CVE-2023-52796", "CVE-2023-52803", "CVE-2023-52821", "CVE-2023-52864", "CVE-2023-52865", "CVE-2023-52867", "CVE-2023-52875", "CVE-2023-52880", "CVE-2024-26625", "CVE-2024-26752", "CVE-2024-26775", "CVE-2024-26828", "CVE-2024-26846", "CVE-2024-26874", "CVE-2024-26900", "CVE-2024-26915", "CVE-2024-26920", "CVE-2024-26921", "CVE-2024-26934", "CVE-2024-26957", "CVE-2024-26958", "CVE-2024-26984", "CVE-2024-26996", "CVE-2024-27059", "CVE-2024-27062", "CVE-2024-27396", "CVE-2024-27398", "CVE-2024-27401", "CVE-2024-27419", "CVE-2024-27436", "CVE-2024-35789", "CVE-2024-35791", "CVE-2024-35809", "CVE-2024-35811", "CVE-2024-35830", "CVE-2024-35849", "CVE-2024-35877", "CVE-2024-35878", "CVE-2024-35887", "CVE-2024-35895", "CVE-2024-35914", "CVE-2024-35932", "CVE-2024-35935", "CVE-2024-35936", "CVE-2024-35944", "CVE-2024-35955", "CVE-2024-35969", "CVE-2024-35982", "CVE-2024-35984", "CVE-2024-36015", "CVE-2024-36029", "CVE-2024-36954");
  script_tag(name:"creation_date", value:"2024-06-12 04:25:31 +0000 (Wed, 12 Jun 2024)");
  script_version("2024-06-12T05:05:44+0000");
  script_tag(name:"last_modification", value:"2024-06-12 05:05:44 +0000 (Wed, 12 Jun 2024)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-05-23 19:13:43 +0000 (Thu, 23 May 2024)");

  script_name("SUSE: Security Advisory (SUSE-SU-2024:1979-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES12\.0SP5)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2024:1979-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2024/suse-su-20241979-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2024:1979-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:

CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
CVE-2023-42755: Check user supplied offsets (bsc#1215702).
CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).
CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)
CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
CVE-2021-47352: Add validation for used length (bsc#1225124).
CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
CVE-2021-47423: Fix file release memory leak (bsc#1225366).
CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).
CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
CVE-2021-47401: Fix stack information leak (bsc#1225242).
CVE-2023-52867: Fix possible ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'Linux Kernel' package(s) on SUSE Linux Enterprise High Performance Computing 12-SP5, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES12.0SP5") {

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure", rpm:"kernel-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base", rpm:"kernel-azure-base~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base-debuginfo", rpm:"kernel-azure-base-debuginfo~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debuginfo", rpm:"kernel-azure-debuginfo~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debugsource", rpm:"kernel-azure-debugsource~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-devel", rpm:"kernel-azure-devel~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-devel-azure", rpm:"kernel-devel-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-source-azure", rpm:"kernel-source-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-syms-azure", rpm:"kernel-syms-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.8%