CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.7%
The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0900-1 advisory.
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2023-52340: Fixed ICMPv6 Packet Too Big packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).
- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).
- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:0900-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(192141);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/28");
script_cve_id(
"CVE-2019-25162",
"CVE-2021-46923",
"CVE-2021-46924",
"CVE-2021-46932",
"CVE-2021-46934",
"CVE-2021-47083",
"CVE-2022-48627",
"CVE-2023-5197",
"CVE-2023-6270",
"CVE-2023-6817",
"CVE-2023-28746",
"CVE-2023-52340",
"CVE-2023-52429",
"CVE-2023-52439",
"CVE-2023-52443",
"CVE-2023-52445",
"CVE-2023-52447",
"CVE-2023-52448",
"CVE-2023-52449",
"CVE-2023-52451",
"CVE-2023-52452",
"CVE-2023-52456",
"CVE-2023-52457",
"CVE-2023-52463",
"CVE-2023-52464",
"CVE-2023-52467",
"CVE-2023-52475",
"CVE-2023-52478",
"CVE-2023-52482",
"CVE-2023-52484",
"CVE-2023-52530",
"CVE-2023-52531",
"CVE-2023-52559",
"CVE-2024-0607",
"CVE-2024-1151",
"CVE-2024-23849",
"CVE-2024-23850",
"CVE-2024-23851",
"CVE-2024-26585",
"CVE-2024-26586",
"CVE-2024-26589",
"CVE-2024-26591",
"CVE-2024-26593",
"CVE-2024-26595",
"CVE-2024-26598",
"CVE-2024-26602",
"CVE-2024-26603",
"CVE-2024-26607",
"CVE-2024-26622"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:0900-1");
script_name(english:"SUSE SLES15 Security Update : kernel (SUSE-SU-2024:0900-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as
referenced in the SUSE-SU-2024:0900-1 advisory.
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach (bsc#1220254).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2023-52340: Fixed ICMPv6 Packet Too Big packets force a DoS of the Linux kernel by forcing
100% CPU (bsc#1219295).
- CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52457: Fixed skipped resource freeing if pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).
- CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253).
- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the
same transaction (bsc#1218216).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1211515");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1213456");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1214064");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218195");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218216");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218562");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219073");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219126");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219127");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219146");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219295");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219827");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219835");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220009");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220238");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220240");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220243");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220250");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220251");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220253");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220255");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220257");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220326");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220335");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220344");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220350");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220364");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220398");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220433");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220444");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220459");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220469");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220649");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220735");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220736");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220797");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220825");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220845");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220917");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220930");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220931");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220933");
# https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9aa3104f");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-25162");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46923");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46924");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46932");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47083");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48627");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-28746");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-5197");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52340");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52429");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52439");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52443");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52445");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52447");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52448");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52449");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52451");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52452");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52456");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52457");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52463");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52464");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52467");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52475");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52478");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52482");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52484");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52530");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52531");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52559");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6270");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6817");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-0607");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-1151");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-23849");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-23850");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-23851");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26585");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26589");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26593");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26595");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26598");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26602");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26603");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26607");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26622");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-26598");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2024/03/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/03/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_111-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-zfcpdump");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15|SLES_SAP15)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP4", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP4", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-64kb-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-devel-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-macros-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-source-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-ESPOS-release-4']},
{'reference':'kernel-64kb-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4', 'sles-ltss-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.4']},
{'reference':'cluster-md-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'dlm-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'gfs2-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'ocfs2-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'kernel-default-livepatch-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-default-livepatch-devel-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-livepatch-5_14_21-150400_24_111-default-1-150400.9.3.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.111.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.111.2', 'sp':'4', 'cpu':'s390x', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.111.2', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.4']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
if ('ltss' >< tolower(check)) ltss_caveat_required = TRUE;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
var ltss_plugin_caveat = NULL;
if(ltss_caveat_required) ltss_plugin_caveat = '\n' +
'NOTE: This vulnerability check contains fixes that apply to\n' +
'packages only available in SUSE Enterprise Linux Server LTSS\n' +
'repositories. Access to these package security updates require\n' +
'a paid SUSE LTSS subscription.\n';
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get() + ltss_plugin_caveat
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-default / dlm-kmp-default / gfs2-kmp-default / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
www.nessus.org/u?9aa3104f
bugzilla.suse.com/1211515
bugzilla.suse.com/1213456
bugzilla.suse.com/1214064
bugzilla.suse.com/1218195
bugzilla.suse.com/1218216
bugzilla.suse.com/1218562
bugzilla.suse.com/1218915
bugzilla.suse.com/1219073
bugzilla.suse.com/1219126
bugzilla.suse.com/1219127
bugzilla.suse.com/1219146
bugzilla.suse.com/1219295
bugzilla.suse.com/1219633
bugzilla.suse.com/1219653
bugzilla.suse.com/1219827
bugzilla.suse.com/1219835
bugzilla.suse.com/1220009
bugzilla.suse.com/1220140
bugzilla.suse.com/1220187
bugzilla.suse.com/1220238
bugzilla.suse.com/1220240
bugzilla.suse.com/1220241
bugzilla.suse.com/1220243
bugzilla.suse.com/1220250
bugzilla.suse.com/1220251
bugzilla.suse.com/1220253
bugzilla.suse.com/1220254
bugzilla.suse.com/1220255
bugzilla.suse.com/1220257
bugzilla.suse.com/1220326
bugzilla.suse.com/1220328
bugzilla.suse.com/1220330
bugzilla.suse.com/1220335
bugzilla.suse.com/1220344
bugzilla.suse.com/1220350
bugzilla.suse.com/1220364
bugzilla.suse.com/1220398
bugzilla.suse.com/1220409
bugzilla.suse.com/1220433
bugzilla.suse.com/1220444
bugzilla.suse.com/1220457
bugzilla.suse.com/1220459
bugzilla.suse.com/1220469
bugzilla.suse.com/1220649
bugzilla.suse.com/1220735
bugzilla.suse.com/1220736
bugzilla.suse.com/1220796
bugzilla.suse.com/1220797
bugzilla.suse.com/1220825
bugzilla.suse.com/1220845
bugzilla.suse.com/1220917
bugzilla.suse.com/1220930
bugzilla.suse.com/1220931
bugzilla.suse.com/1220933
www.suse.com/security/cve/CVE-2019-25162
www.suse.com/security/cve/CVE-2021-46923
www.suse.com/security/cve/CVE-2021-46924
www.suse.com/security/cve/CVE-2021-46932
www.suse.com/security/cve/CVE-2021-46934
www.suse.com/security/cve/CVE-2021-47083
www.suse.com/security/cve/CVE-2022-48627
www.suse.com/security/cve/CVE-2023-28746
www.suse.com/security/cve/CVE-2023-5197
www.suse.com/security/cve/CVE-2023-52340
www.suse.com/security/cve/CVE-2023-52429
www.suse.com/security/cve/CVE-2023-52439
www.suse.com/security/cve/CVE-2023-52443
www.suse.com/security/cve/CVE-2023-52445
www.suse.com/security/cve/CVE-2023-52447
www.suse.com/security/cve/CVE-2023-52448
www.suse.com/security/cve/CVE-2023-52449
www.suse.com/security/cve/CVE-2023-52451
www.suse.com/security/cve/CVE-2023-52452
www.suse.com/security/cve/CVE-2023-52456
www.suse.com/security/cve/CVE-2023-52457
www.suse.com/security/cve/CVE-2023-52463
www.suse.com/security/cve/CVE-2023-52464
www.suse.com/security/cve/CVE-2023-52467
www.suse.com/security/cve/CVE-2023-52475
www.suse.com/security/cve/CVE-2023-52478
www.suse.com/security/cve/CVE-2023-52482
www.suse.com/security/cve/CVE-2023-52484
www.suse.com/security/cve/CVE-2023-52530
www.suse.com/security/cve/CVE-2023-52531
www.suse.com/security/cve/CVE-2023-52559
www.suse.com/security/cve/CVE-2023-6270
www.suse.com/security/cve/CVE-2023-6817
www.suse.com/security/cve/CVE-2024-0607
www.suse.com/security/cve/CVE-2024-1151
www.suse.com/security/cve/CVE-2024-23849
www.suse.com/security/cve/CVE-2024-23850
www.suse.com/security/cve/CVE-2024-23851
www.suse.com/security/cve/CVE-2024-26585
www.suse.com/security/cve/CVE-2024-26586
www.suse.com/security/cve/CVE-2024-26589
www.suse.com/security/cve/CVE-2024-26591
www.suse.com/security/cve/CVE-2024-26593
www.suse.com/security/cve/CVE-2024-26595
www.suse.com/security/cve/CVE-2024-26598
www.suse.com/security/cve/CVE-2024-26602
www.suse.com/security/cve/CVE-2024-26603
www.suse.com/security/cve/CVE-2024-26607
www.suse.com/security/cve/CVE-2024-26622
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.7%