The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:1202 advisory.
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. (CVE-2022-3564)
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action mirred) a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. (CVE-2022-4269)
A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-4378)
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel.
This flaw allows an attacker to conduct a remote denial (CVE-2022-4379)
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution. (CVE-2023-0179)
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.
SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e (CVE-2023-0266)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2023:1202. The text
# itself is copyright (C) Red Hat, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(172547);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/26");
script_cve_id(
"CVE-2022-3564",
"CVE-2022-4269",
"CVE-2022-4378",
"CVE-2022-4379",
"CVE-2023-0179",
"CVE-2023-0266"
);
script_xref(name:"RHSA", value:"2023:1202");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/04/20");
script_name(english:"RHEL 9 : kernel (RHSA-2023:1202)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as
referenced in the RHSA-2023:1202 advisory.
- A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the
function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The
manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated
identifier of this vulnerability is VDB-211087. (CVE-2022-3564)
- A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking
configuration (redirecting egress packets to ingress using TC action mirred) a local unprivileged user
could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a
retransmission, resulting in a denial of service condition. (CVE-2022-4269)
- A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain
kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their
privileges on the system. (CVE-2022-4378)
- A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel.
This flaw allows an attacker to conduct a remote denial (CVE-2022-4379)
- A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could
allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to
the root user via arbitrary code execution. (CVE-2023-0179)
- A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.
SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result
in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit
56b88b50565cd8b946a2d00b0c83927b7ebb055e (CVE-2023-0266)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-3564");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-4269");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-4378");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2022-4379");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2023-0179");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2023-0266");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2023:1202");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-0266");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(120, 131, 190, 416, 787, 833);
script_set_attribute(attribute:"vendor_severity", value:"Important");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/10/17");
script_set_attribute(attribute:"patch_publication_date", value:"2023/03/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/03/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_e4s:9.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_eus:9.0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:bpftool");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-core");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel-matched");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-devel-matched");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-modules");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel-matched");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:perf");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python3-perf");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl", "linux_alt_patch_detect.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
include('rhel.inc');
include('ksplice.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'eq', os_version: os_ver, rhel_version: '9.0')) audit(AUDIT_OS_NOT, 'Red Hat 9.0', 'Red Hat ' + os_ver);
if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
if (get_one_kb_item('Host/ksplice/kernel-cves'))
{
rm_kb_item(name:'Host/uptrack-uname-r');
var cve_list = make_list('CVE-2022-3564', 'CVE-2022-4269', 'CVE-2022-4378', 'CVE-2022-4379', 'CVE-2023-0179', 'CVE-2023-0266');
if (ksplice_cves_check(cve_list))
{
audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2023:1202');
}
else
{
__rpm_report = ksplice_reporting_text();
}
}
var constraints = [
{
'repo_relative_urls': [
'content/e4s/rhel9/9.0/aarch64/appstream/debug',
'content/e4s/rhel9/9.0/aarch64/appstream/os',
'content/e4s/rhel9/9.0/aarch64/appstream/source/SRPMS',
'content/e4s/rhel9/9.0/aarch64/baseos/debug',
'content/e4s/rhel9/9.0/aarch64/baseos/os',
'content/e4s/rhel9/9.0/aarch64/baseos/source/SRPMS',
'content/e4s/rhel9/9.0/aarch64/highavailability/debug',
'content/e4s/rhel9/9.0/aarch64/highavailability/os',
'content/e4s/rhel9/9.0/aarch64/highavailability/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/appstream/debug',
'content/e4s/rhel9/9.0/ppc64le/appstream/os',
'content/e4s/rhel9/9.0/ppc64le/appstream/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/baseos/debug',
'content/e4s/rhel9/9.0/ppc64le/baseos/os',
'content/e4s/rhel9/9.0/ppc64le/baseos/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/highavailability/debug',
'content/e4s/rhel9/9.0/ppc64le/highavailability/os',
'content/e4s/rhel9/9.0/ppc64le/highavailability/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/resilientstorage/debug',
'content/e4s/rhel9/9.0/ppc64le/resilientstorage/os',
'content/e4s/rhel9/9.0/ppc64le/resilientstorage/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/sap-solutions/debug',
'content/e4s/rhel9/9.0/ppc64le/sap-solutions/os',
'content/e4s/rhel9/9.0/ppc64le/sap-solutions/source/SRPMS',
'content/e4s/rhel9/9.0/ppc64le/sap/debug',
'content/e4s/rhel9/9.0/ppc64le/sap/os',
'content/e4s/rhel9/9.0/ppc64le/sap/source/SRPMS',
'content/e4s/rhel9/9.0/s390x/appstream/debug',
'content/e4s/rhel9/9.0/s390x/appstream/os',
'content/e4s/rhel9/9.0/s390x/appstream/source/SRPMS',
'content/e4s/rhel9/9.0/s390x/baseos/debug',
'content/e4s/rhel9/9.0/s390x/baseos/os',
'content/e4s/rhel9/9.0/s390x/baseos/source/SRPMS',
'content/e4s/rhel9/9.0/s390x/highavailability/debug',
'content/e4s/rhel9/9.0/s390x/highavailability/os',
'content/e4s/rhel9/9.0/s390x/highavailability/source/SRPMS',
'content/e4s/rhel9/9.0/s390x/resilientstorage/debug',
'content/e4s/rhel9/9.0/s390x/resilientstorage/os',
'content/e4s/rhel9/9.0/s390x/resilientstorage/source/SRPMS',
'content/e4s/rhel9/9.0/s390x/sap/debug',
'content/e4s/rhel9/9.0/s390x/sap/os',
'content/e4s/rhel9/9.0/s390x/sap/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/appstream/debug',
'content/e4s/rhel9/9.0/x86_64/appstream/os',
'content/e4s/rhel9/9.0/x86_64/appstream/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/baseos/debug',
'content/e4s/rhel9/9.0/x86_64/baseos/os',
'content/e4s/rhel9/9.0/x86_64/baseos/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/highavailability/debug',
'content/e4s/rhel9/9.0/x86_64/highavailability/os',
'content/e4s/rhel9/9.0/x86_64/highavailability/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/nfv/debug',
'content/e4s/rhel9/9.0/x86_64/nfv/os',
'content/e4s/rhel9/9.0/x86_64/nfv/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/resilientstorage/debug',
'content/e4s/rhel9/9.0/x86_64/resilientstorage/os',
'content/e4s/rhel9/9.0/x86_64/resilientstorage/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/rt/debug',
'content/e4s/rhel9/9.0/x86_64/rt/os',
'content/e4s/rhel9/9.0/x86_64/rt/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/sap-solutions/debug',
'content/e4s/rhel9/9.0/x86_64/sap-solutions/os',
'content/e4s/rhel9/9.0/x86_64/sap-solutions/source/SRPMS',
'content/e4s/rhel9/9.0/x86_64/sap/debug',
'content/e4s/rhel9/9.0/x86_64/sap/os',
'content/e4s/rhel9/9.0/x86_64/sap/source/SRPMS',
'content/eus/rhel9/9.0/aarch64/appstream/debug',
'content/eus/rhel9/9.0/aarch64/appstream/os',
'content/eus/rhel9/9.0/aarch64/appstream/source/SRPMS',
'content/eus/rhel9/9.0/aarch64/baseos/debug',
'content/eus/rhel9/9.0/aarch64/baseos/os',
'content/eus/rhel9/9.0/aarch64/baseos/source/SRPMS',
'content/eus/rhel9/9.0/aarch64/codeready-builder/debug',
'content/eus/rhel9/9.0/aarch64/codeready-builder/os',
'content/eus/rhel9/9.0/aarch64/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.0/aarch64/highavailability/debug',
'content/eus/rhel9/9.0/aarch64/highavailability/os',
'content/eus/rhel9/9.0/aarch64/highavailability/source/SRPMS',
'content/eus/rhel9/9.0/aarch64/supplementary/debug',
'content/eus/rhel9/9.0/aarch64/supplementary/os',
'content/eus/rhel9/9.0/aarch64/supplementary/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/appstream/debug',
'content/eus/rhel9/9.0/ppc64le/appstream/os',
'content/eus/rhel9/9.0/ppc64le/appstream/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/baseos/debug',
'content/eus/rhel9/9.0/ppc64le/baseos/os',
'content/eus/rhel9/9.0/ppc64le/baseos/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/codeready-builder/debug',
'content/eus/rhel9/9.0/ppc64le/codeready-builder/os',
'content/eus/rhel9/9.0/ppc64le/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/highavailability/debug',
'content/eus/rhel9/9.0/ppc64le/highavailability/os',
'content/eus/rhel9/9.0/ppc64le/highavailability/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/resilientstorage/debug',
'content/eus/rhel9/9.0/ppc64le/resilientstorage/os',
'content/eus/rhel9/9.0/ppc64le/resilientstorage/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/sap-solutions/debug',
'content/eus/rhel9/9.0/ppc64le/sap-solutions/os',
'content/eus/rhel9/9.0/ppc64le/sap-solutions/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/sap/debug',
'content/eus/rhel9/9.0/ppc64le/sap/os',
'content/eus/rhel9/9.0/ppc64le/sap/source/SRPMS',
'content/eus/rhel9/9.0/ppc64le/supplementary/debug',
'content/eus/rhel9/9.0/ppc64le/supplementary/os',
'content/eus/rhel9/9.0/ppc64le/supplementary/source/SRPMS',
'content/eus/rhel9/9.0/s390x/appstream/debug',
'content/eus/rhel9/9.0/s390x/appstream/os',
'content/eus/rhel9/9.0/s390x/appstream/source/SRPMS',
'content/eus/rhel9/9.0/s390x/baseos/debug',
'content/eus/rhel9/9.0/s390x/baseos/os',
'content/eus/rhel9/9.0/s390x/baseos/source/SRPMS',
'content/eus/rhel9/9.0/s390x/codeready-builder/debug',
'content/eus/rhel9/9.0/s390x/codeready-builder/os',
'content/eus/rhel9/9.0/s390x/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.0/s390x/highavailability/debug',
'content/eus/rhel9/9.0/s390x/highavailability/os',
'content/eus/rhel9/9.0/s390x/highavailability/source/SRPMS',
'content/eus/rhel9/9.0/s390x/resilientstorage/debug',
'content/eus/rhel9/9.0/s390x/resilientstorage/os',
'content/eus/rhel9/9.0/s390x/resilientstorage/source/SRPMS',
'content/eus/rhel9/9.0/s390x/sap/debug',
'content/eus/rhel9/9.0/s390x/sap/os',
'content/eus/rhel9/9.0/s390x/sap/source/SRPMS',
'content/eus/rhel9/9.0/s390x/supplementary/debug',
'content/eus/rhel9/9.0/s390x/supplementary/os',
'content/eus/rhel9/9.0/s390x/supplementary/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/appstream/debug',
'content/eus/rhel9/9.0/x86_64/appstream/os',
'content/eus/rhel9/9.0/x86_64/appstream/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/baseos/debug',
'content/eus/rhel9/9.0/x86_64/baseos/os',
'content/eus/rhel9/9.0/x86_64/baseos/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/codeready-builder/debug',
'content/eus/rhel9/9.0/x86_64/codeready-builder/os',
'content/eus/rhel9/9.0/x86_64/codeready-builder/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/highavailability/debug',
'content/eus/rhel9/9.0/x86_64/highavailability/os',
'content/eus/rhel9/9.0/x86_64/highavailability/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/resilientstorage/debug',
'content/eus/rhel9/9.0/x86_64/resilientstorage/os',
'content/eus/rhel9/9.0/x86_64/resilientstorage/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/sap-solutions/debug',
'content/eus/rhel9/9.0/x86_64/sap-solutions/os',
'content/eus/rhel9/9.0/x86_64/sap-solutions/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/sap/debug',
'content/eus/rhel9/9.0/x86_64/sap/os',
'content/eus/rhel9/9.0/x86_64/sap/source/SRPMS',
'content/eus/rhel9/9.0/x86_64/supplementary/debug',
'content/eus/rhel9/9.0/x86_64/supplementary/os',
'content/eus/rhel9/9.0/x86_64/supplementary/source/SRPMS'
],
'pkgs': [
{'reference':'bpftool-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-core-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-cross-headers-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-core-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-devel-matched-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-modules-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-debug-modules-extra-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-devel-matched-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-modules-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-modules-extra-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'aarch64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'aarch64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'ppc64le', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-tools-libs-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'x86_64', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-core-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-devel-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-devel-matched-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-modules-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'kernel-zfcpdump-modules-extra-5.14.0-70.49.1.el9_0', 'sp':'0', 'cpu':'s390x', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'perf-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE},
{'reference':'python3-perf-5.14.0-70.49.1.el9_0', 'sp':'0', 'release':'9', 'rpm_spec_vers_cmp':TRUE}
]
}
];
var applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);
if(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);
var flag = 0;
foreach var constraint_array ( constraints ) {
var repo_relative_urls = NULL;
if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];
foreach var pkg ( constraint_array['pkgs'] ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];
if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];
if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];
if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];
if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];
if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];
if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
if (reference &&
_release &&
rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&
(applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&
rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
if (flag)
{
var subscription_caveat = '\n' +
'NOTE: This vulnerability check contains fixes that apply to\n' +
'packages only available in the Red Hat Enterprise Linux\n' +
'Extended Update Support or Update Services for SAP Solutions repositories.\n' +
'Access to these repositories requires a paid RHEL subscription.\n';
var extra = NULL;
if (isnull(applicable_repo_urls) || !applicable_repo_urls) extra = subscription_caveat + rpm_report_get() + redhat_report_repo_caveat();
else extra = subscription_caveat + rpm_report_get();
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : extra
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-core / kernel-cross-headers / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | rhel_e4s | 9.0 | cpe:/o:redhat:rhel_e4s:9.0 |
redhat | rhel_eus | 9.0 | cpe:/o:redhat:rhel_eus:9.0 |
redhat | enterprise_linux | bpftool | p-cpe:/a:redhat:enterprise_linux:bpftool |
redhat | enterprise_linux | kernel | p-cpe:/a:redhat:enterprise_linux:kernel |
redhat | enterprise_linux | kernel-core | p-cpe:/a:redhat:enterprise_linux:kernel-core |
redhat | enterprise_linux | kernel-cross-headers | p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers |
redhat | enterprise_linux | kernel-debug | p-cpe:/a:redhat:enterprise_linux:kernel-debug |
redhat | enterprise_linux | kernel-debug-core | p-cpe:/a:redhat:enterprise_linux:kernel-debug-core |
redhat | enterprise_linux | kernel-debug-devel | p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel |
redhat | enterprise_linux | kernel-debug-devel-matched | p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel-matched |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
access.redhat.com/errata/RHSA-2023:1202
access.redhat.com/security/cve/CVE-2022-3564
access.redhat.com/security/cve/CVE-2022-4269
access.redhat.com/security/cve/CVE-2022-4378
access.redhat.com/security/cve/CVE-2022-4379
access.redhat.com/security/cve/CVE-2023-0179
access.redhat.com/security/cve/CVE-2023-0266