The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:4613-1 advisory.
A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV). (CVE-2022-0171) (CVE-2022-2602)
A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. (CVE-2022-23816) (CVE-2022-28693)
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability. (CVE-2022-3567)
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. (CVE-2022-3628)
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability. (CVE-2022-3635)
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system. (CVE-2022-3707)
An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system. (CVE-2022-3903)
A flaw was found in the Linux kernel’s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. (CVE-2022-4129)
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. (CVE-2022-4139)
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress. (CVE-2022-41850)
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information. (CVE-2022-41858)
There is an infoleak vulnerability in the Linux kernel’s net/bluetooth/l2cap_core.c’s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url (CVE-2022-42895)
There are use-after-free vulnerabilities in the Linux kernel’s net/bluetooth/l2cap_core.c’s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url (CVE-2022-42896)
A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-4378)
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (CVE-2022-43945)
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. (CVE-2022-45934)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2022:4613-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(170228);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/09/07");
script_cve_id(
"CVE-2022-2602",
"CVE-2022-3567",
"CVE-2022-3628",
"CVE-2022-3635",
"CVE-2022-3707",
"CVE-2022-3903",
"CVE-2022-4095",
"CVE-2022-4129",
"CVE-2022-4139",
"CVE-2022-4378",
"CVE-2022-28693",
"CVE-2022-41850",
"CVE-2022-41858",
"CVE-2022-42895",
"CVE-2022-42896",
"CVE-2022-43945",
"CVE-2022-45934"
);
script_xref(name:"SuSE", value:"SUSE-SU-2022:4613-1");
script_name(english:"openSUSE 15 Security Update : kernel (SUSE-SU-2022:4613-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote openSUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the
SUSE-SU-2022:4613-1 advisory.
- A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root
(host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD
CPU that supports Secure Encrypted Virtualization (SEV). (CVE-2022-0171) (CVE-2022-2602)
- A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary
speculative code execution under certain microarchitecture-dependent conditions. (CVE-2022-23816)
(CVE-2022-28693)
- A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects
the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to
race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier
assigned to this vulnerability. (CVE-2022-3567)
- A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs
when a user connects to a malicious USB device. This can allow a local user to crash the system or
escalate their privileges. (CVE-2022-3628)
- A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue
is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation
leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the
identifier assigned to this vulnerability. (CVE-2022-3635)
- A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card
system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could
allow a local user to crash the system. (CVE-2022-3707)
- An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This
issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the
resources, causing denial of service or potentially crashing the system. (CVE-2022-3903)
- A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing
sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw
to potentially crash the system causing a denial of service. (CVE-2022-4129)
- An incorrect TLB flush issue was found in the Linux kernel's GPU i915 kernel driver, potentially leading
to random memory corruption or data leaks. This flaw could allow a local user to crash the system or
escalate their privileges on the system. (CVE-2022-4139)
- roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition
and resultant use-after-free in certain situations where a report is received while copying a
report->value is in progress. (CVE-2022-41850)
- A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in
progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to
crash the system or leak internal kernel information. (CVE-2022-41858)
- There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req
function which can be used to leak kernel pointers remotely. We recommend upgrading past commit
https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
https://www.google.com/url (CVE-2022-42895)
- There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect
and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively)
remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within
proximity of the victim. We recommend upgrading past commit https://www.google.com/url
https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
https://www.google.com/url (CVE-2022-42896)
- A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain
kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their
privileges on the system. (CVE-2022-4378)
- The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer
overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send
buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer
to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC
message with garbage data is still correctly formed according to the specification and is passed forward
to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the
allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (CVE-2022-43945)
- An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c
has an integer wraparound via L2CAP_CONF_REQ packets. (CVE-2022-45934)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1065729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1071995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1156395");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1184350");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1189297");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1192761");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200845");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1201455");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203144");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203746");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204017");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204142");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204215");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204446");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204693");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204791");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204827");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204850");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204934");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204957");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205128");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205130");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205220");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205329");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205428");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205473");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205700");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205709");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205984");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205985");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205986");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206032");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206037");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206207");
# https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?55005ec1");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-2602");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-28693");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3567");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3628");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3707");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-3903");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-4095");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-4129");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-4139");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41850");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-41858");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42895");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-42896");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-4378");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-43945");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-45934");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-42896");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/08/15");
script_set_attribute(attribute:"patch_publication_date", value:"2022/12/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/20");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^SUSE") audit(AUDIT_OS_NOT, "openSUSE");
var os_ver = pregmatch(pattern: "^(SUSE[\d.]+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SUSE15\.3)$", string:os_ver)) audit(AUDIT_OS_NOT, 'openSUSE 15', 'openSUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE (' + os_ver + ')', cpu);
var pkgs = [
{'reference':'cluster-md-kmp-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'dlm-kmp-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'gfs2-kmp-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-devel-rt-5.3.18-150300.112.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-rt-devel-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-rt_debug-devel-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-source-rt-5.3.18-150300.112.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'kernel-syms-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']},
{'reference':'ocfs2-kmp-rt-5.3.18-150300.112.1', 'cpu':'x86_64', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.3']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-rt / dlm-kmp-rt / gfs2-kmp-rt / kernel-devel-rt / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4095
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
www.nessus.org/u?55005ec1
bugzilla.suse.com/1065729
bugzilla.suse.com/1071995
bugzilla.suse.com/1156395
bugzilla.suse.com/1184350
bugzilla.suse.com/1189297
bugzilla.suse.com/1192761
bugzilla.suse.com/1200845
bugzilla.suse.com/1201455
bugzilla.suse.com/1203144
bugzilla.suse.com/1203746
bugzilla.suse.com/1204017
bugzilla.suse.com/1204142
bugzilla.suse.com/1204215
bugzilla.suse.com/1204241
bugzilla.suse.com/1204328
bugzilla.suse.com/1204446
bugzilla.suse.com/1204631
bugzilla.suse.com/1204636
bugzilla.suse.com/1204693
bugzilla.suse.com/1204780
bugzilla.suse.com/1204791
bugzilla.suse.com/1204810
bugzilla.suse.com/1204827
bugzilla.suse.com/1204850
bugzilla.suse.com/1204868
bugzilla.suse.com/1204934
bugzilla.suse.com/1204957
bugzilla.suse.com/1204963
bugzilla.suse.com/1204967
bugzilla.suse.com/1205128
bugzilla.suse.com/1205130
bugzilla.suse.com/1205186
bugzilla.suse.com/1205220
bugzilla.suse.com/1205329
bugzilla.suse.com/1205330
bugzilla.suse.com/1205428
bugzilla.suse.com/1205473
bugzilla.suse.com/1205514
bugzilla.suse.com/1205617
bugzilla.suse.com/1205671
bugzilla.suse.com/1205700
bugzilla.suse.com/1205705
bugzilla.suse.com/1205709
bugzilla.suse.com/1205753
bugzilla.suse.com/1205796
bugzilla.suse.com/1205984
bugzilla.suse.com/1205985
bugzilla.suse.com/1205986
bugzilla.suse.com/1205987
bugzilla.suse.com/1205988
bugzilla.suse.com/1205989
bugzilla.suse.com/1206032
bugzilla.suse.com/1206037
bugzilla.suse.com/1206207
www.suse.com/security/cve/CVE-2022-2602
www.suse.com/security/cve/CVE-2022-28693
www.suse.com/security/cve/CVE-2022-3567
www.suse.com/security/cve/CVE-2022-3628
www.suse.com/security/cve/CVE-2022-3635
www.suse.com/security/cve/CVE-2022-3707
www.suse.com/security/cve/CVE-2022-3903
www.suse.com/security/cve/CVE-2022-4095
www.suse.com/security/cve/CVE-2022-4129
www.suse.com/security/cve/CVE-2022-4139
www.suse.com/security/cve/CVE-2022-41850
www.suse.com/security/cve/CVE-2022-41858
www.suse.com/security/cve/CVE-2022-42895
www.suse.com/security/cve/CVE-2022-42896
www.suse.com/security/cve/CVE-2022-4378
www.suse.com/security/cve/CVE-2022-43945
www.suse.com/security/cve/CVE-2022-45934