7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.1%
The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2183-1 advisory.
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
- NFC: nxp: add NXP1002 (bsc#1185589).
- PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- md: Replace snprintf with scnprintf (git-fixes).
- netfilter: nf_tables: GC transaction race with abort path (git-fixes).
- netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
- netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
- netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
- netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
- netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
- netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
- netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
- netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
- netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
- netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
- netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
- netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
- netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
- netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
- netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
- netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
- x86/pkeys: Revert a5eff7259790 ('x86/pkeys: Add PKRU value to init_fpstate') (bsc#1215356).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:2183-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(200932);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/25");
script_cve_id(
"CVE-2021-3743",
"CVE-2021-39698",
"CVE-2021-43056",
"CVE-2021-43527",
"CVE-2021-47104",
"CVE-2021-47220",
"CVE-2021-47229",
"CVE-2021-47231",
"CVE-2021-47236",
"CVE-2021-47239",
"CVE-2021-47240",
"CVE-2021-47246",
"CVE-2021-47252",
"CVE-2021-47254",
"CVE-2021-47255",
"CVE-2021-47259",
"CVE-2021-47260",
"CVE-2021-47261",
"CVE-2021-47267",
"CVE-2021-47269",
"CVE-2021-47270",
"CVE-2021-47274",
"CVE-2021-47275",
"CVE-2021-47276",
"CVE-2021-47280",
"CVE-2021-47284",
"CVE-2021-47285",
"CVE-2021-47288",
"CVE-2021-47289",
"CVE-2021-47296",
"CVE-2021-47301",
"CVE-2021-47302",
"CVE-2021-47305",
"CVE-2021-47307",
"CVE-2021-47308",
"CVE-2021-47314",
"CVE-2021-47315",
"CVE-2021-47320",
"CVE-2021-47321",
"CVE-2021-47323",
"CVE-2021-47324",
"CVE-2021-47330",
"CVE-2021-47332",
"CVE-2021-47333",
"CVE-2021-47334",
"CVE-2021-47338",
"CVE-2021-47341",
"CVE-2021-47344",
"CVE-2021-47347",
"CVE-2021-47350",
"CVE-2021-47354",
"CVE-2021-47356",
"CVE-2021-47369",
"CVE-2021-47375",
"CVE-2021-47378",
"CVE-2021-47381",
"CVE-2021-47382",
"CVE-2021-47383",
"CVE-2021-47388",
"CVE-2021-47391",
"CVE-2021-47393",
"CVE-2021-47395",
"CVE-2021-47396",
"CVE-2021-47399",
"CVE-2021-47402",
"CVE-2021-47404",
"CVE-2021-47405",
"CVE-2021-47416",
"CVE-2021-47423",
"CVE-2021-47424",
"CVE-2021-47425",
"CVE-2021-47431",
"CVE-2021-47434",
"CVE-2021-47436",
"CVE-2021-47441",
"CVE-2021-47442",
"CVE-2021-47443",
"CVE-2021-47445",
"CVE-2021-47456",
"CVE-2021-47460",
"CVE-2021-47464",
"CVE-2021-47465",
"CVE-2021-47468",
"CVE-2021-47473",
"CVE-2021-47482",
"CVE-2021-47483",
"CVE-2021-47485",
"CVE-2021-47495",
"CVE-2021-47496",
"CVE-2021-47497",
"CVE-2021-47500",
"CVE-2021-47505",
"CVE-2021-47506",
"CVE-2021-47511",
"CVE-2021-47516",
"CVE-2021-47522",
"CVE-2021-47538",
"CVE-2021-47541",
"CVE-2021-47542",
"CVE-2021-47562",
"CVE-2021-47563",
"CVE-2021-47565",
"CVE-2022-20132",
"CVE-2022-48673",
"CVE-2023-0160",
"CVE-2023-1829",
"CVE-2023-2176",
"CVE-2023-4244",
"CVE-2023-6531",
"CVE-2023-47233",
"CVE-2023-52433",
"CVE-2023-52581",
"CVE-2023-52591",
"CVE-2023-52654",
"CVE-2023-52655",
"CVE-2023-52686",
"CVE-2023-52840",
"CVE-2023-52871",
"CVE-2023-52880",
"CVE-2024-26581",
"CVE-2024-26643",
"CVE-2024-26828",
"CVE-2024-26925",
"CVE-2024-26929",
"CVE-2024-26930",
"CVE-2024-27398",
"CVE-2024-27413",
"CVE-2024-35811",
"CVE-2024-35895",
"CVE-2024-35914"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:2183-1");
script_name(english:"SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2183-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as
referenced in the SUSE-SU-2024:2183-1 advisory.
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve
local privilege escalation (bsc#1215420).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve
local privilege escalation (bsc#1215420).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
- NFC: nxp: add NXP1002 (bsc#1185589).
- PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- md: Replace snprintf with scnprintf (git-fixes).
- netfilter: nf_tables: GC transaction race with abort path (git-fixes).
- netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
- netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
- netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
- netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
- netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
- netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
- netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
- netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
- netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
- netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
- netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
- netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
- netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
- netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
- netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
- netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
- x86/pkeys: Revert a5eff7259790 ('x86/pkeys: Add PKRU value to init_fpstate') (bsc#1215356).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1065729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1151927");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1154353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1156395");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1184631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1185902");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1188616");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1188772");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1189883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190795");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1191452");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1192107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194288");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1210335");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1210629");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215356");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215420");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1216702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217169");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220137");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220144");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220877");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222251");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223084");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223384");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223390");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223934");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224099");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224174");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224438");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224511");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224592");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224831");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224832");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224841");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224843");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224846");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224849");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224854");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224859");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224882");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224888");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224889");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224892");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224904");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224907");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224909");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224916");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224917");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224922");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224923");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224924");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224928");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224961");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224965");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224968");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224981");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224984");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224997");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225026");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225030");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225058");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225084");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225091");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225113");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225143");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225164");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225177");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225181");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225192");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225193");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225201");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225206");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225207");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225208");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225214");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225223");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225224");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225232");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225238");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225244");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225251");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225256");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225261");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225262");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225263");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225301");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225303");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225318");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225321");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225326");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225327");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225336");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225341");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225346");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225351");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225355");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225360");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225366");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225367");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225384");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225390");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225393");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225400");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225404");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225411");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225427");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225437");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225448");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225453");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225455");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225499");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225500");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225534");
script_set_attribute(attribute:"see_also", value:"https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-3743");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-39698");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-43056");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-43527");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47104");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47220");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47229");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47231");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47236");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47239");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47240");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47246");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47252");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47254");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47255");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47259");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47260");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47261");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47267");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47269");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47270");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47274");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47275");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47276");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47280");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47284");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47285");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47288");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47289");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47296");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47301");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47302");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47305");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47307");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47308");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47314");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47315");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47320");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47321");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47323");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47324");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47330");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47332");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47333");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47334");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47338");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47341");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47344");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47347");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47350");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47354");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47356");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47369");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47375");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47378");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47381");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47382");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47383");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47388");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47391");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47393");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47395");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47396");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47399");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47402");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47404");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47405");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47416");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47423");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47424");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47425");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47431");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47434");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47436");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47441");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47442");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47443");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47445");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47456");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47460");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47464");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47465");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47468");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47473");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47482");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47483");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47485");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47495");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47496");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47497");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47500");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47505");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47506");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47511");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47516");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47522");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47538");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47541");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47542");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47562");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47563");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47565");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-20132");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48673");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0160");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-1829");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-2176");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-4244");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-47233");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52433");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52581");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52654");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52655");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52686");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52840");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52871");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52880");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6531");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26581");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26643");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26828");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26925");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26929");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27398");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27413");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35811");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35895");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35914");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-43527");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/10/28");
script_set_attribute(attribute:"patch_publication_date", value:"2024/06/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/25");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150200_24_194-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-preempt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-preempt-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15|SLES_SAP15)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15 / SLES_SAP15', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(2)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP2", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(2)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP2", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-default-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-default-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-devel-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-macros-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-obs-build-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-preempt-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-preempt-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-source-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-syms-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'reiserfs-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.2']},
{'reference':'kernel-default-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-default-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-default-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-default-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-devel-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-macros-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-obs-build-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-obs-build-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-preempt-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-preempt-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-preempt-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-preempt-devel-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-source-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2', 'sles-ltss-release-15.2']},
{'reference':'kernel-syms-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'kernel-syms-5.3.18-150200.24.194.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-LTSS-release-15.2']},
{'reference':'cluster-md-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.2']},
{'reference':'dlm-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.2']},
{'reference':'gfs2-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.2']},
{'reference':'ocfs2-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.2']},
{'reference':'kernel-default-livepatch-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.2']},
{'reference':'kernel-default-livepatch-devel-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.2']},
{'reference':'kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.2']},
{'reference':'kernel-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']},
{'reference':'kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']},
{'reference':'kernel-default-devel-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']},
{'reference':'kernel-obs-build-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']},
{'reference':'kernel-syms-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']},
{'reference':'reiserfs-kmp-default-5.3.18-150200.24.194.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-ltss-release-15.2']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
if ('ltss' >< tolower(check)) ltss_caveat_required = TRUE;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
var ltss_plugin_caveat = NULL;
if(ltss_caveat_required) ltss_plugin_caveat = '\n' +
'NOTE: This vulnerability check contains fixes that apply to\n' +
'packages only available in SUSE Enterprise Linux Server LTSS\n' +
'repositories. Access to these package security updates require\n' +
'a paid SUSE LTSS subscription.\n';
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + ltss_plugin_caveat
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-default / dlm-kmp-default / gfs2-kmp-default / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | kernel-macros | p-cpe:/a:novell:suse_linux:kernel-macros |
novell | suse_linux | kernel-preempt-devel | p-cpe:/a:novell:suse_linux:kernel-preempt-devel |
novell | suse_linux | ocfs2-kmp-default | p-cpe:/a:novell:suse_linux:ocfs2-kmp-default |
novell | suse_linux | dlm-kmp-default | p-cpe:/a:novell:suse_linux:dlm-kmp-default |
novell | suse_linux | kernel-default-base | p-cpe:/a:novell:suse_linux:kernel-default-base |
novell | suse_linux | kernel-livepatch-5_3_18-150200_24_194-default | p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150200_24_194-default |
novell | suse_linux | kernel-preempt | p-cpe:/a:novell:suse_linux:kernel-preempt |
novell | suse_linux | kernel-default-livepatch | p-cpe:/a:novell:suse_linux:kernel-default-livepatch |
novell | suse_linux | kernel-default-devel | p-cpe:/a:novell:suse_linux:kernel-default-devel |
novell | suse_linux | kernel-devel | p-cpe:/a:novell:suse_linux:kernel-devel |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47220
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47239
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47252
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47254
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47255
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47259
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47260
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47261
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47267
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47274
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47275
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47276
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47280
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47302
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47305
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47307
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47308
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47314
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47315
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47320
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47321
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47323
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47324
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47330
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47332
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47333
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47334
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47338
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47344
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47347
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47350
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47354
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47381
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47404
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20132
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48673
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914
bugzilla.suse.com/1065729
bugzilla.suse.com/1151927
bugzilla.suse.com/1154353
bugzilla.suse.com/1156395
bugzilla.suse.com/1174585
bugzilla.suse.com/1176869
bugzilla.suse.com/1184631
bugzilla.suse.com/1185589
bugzilla.suse.com/1185902
bugzilla.suse.com/1188616
bugzilla.suse.com/1188772
bugzilla.suse.com/1189883
bugzilla.suse.com/1190795
bugzilla.suse.com/1191452
bugzilla.suse.com/1192107
bugzilla.suse.com/1194288
bugzilla.suse.com/1196956
bugzilla.suse.com/1200619
bugzilla.suse.com/1208813
bugzilla.suse.com/1209657
bugzilla.suse.com/1210335
bugzilla.suse.com/1210629
bugzilla.suse.com/1215356
bugzilla.suse.com/1215420
bugzilla.suse.com/1216702
bugzilla.suse.com/1217169
bugzilla.suse.com/1220137
bugzilla.suse.com/1220144
bugzilla.suse.com/1220754
bugzilla.suse.com/1220877
bugzilla.suse.com/1220960
bugzilla.suse.com/1221044
bugzilla.suse.com/1221829
bugzilla.suse.com/1222251
bugzilla.suse.com/1222619
bugzilla.suse.com/1223084
bugzilla.suse.com/1223384
bugzilla.suse.com/1223390
bugzilla.suse.com/1223934
bugzilla.suse.com/1224099
bugzilla.suse.com/1224174
bugzilla.suse.com/1224438
bugzilla.suse.com/1224482
bugzilla.suse.com/1224511
bugzilla.suse.com/1224592
bugzilla.suse.com/1224831
bugzilla.suse.com/1224832
bugzilla.suse.com/1224834
bugzilla.suse.com/1224841
bugzilla.suse.com/1224843
bugzilla.suse.com/1224846
bugzilla.suse.com/1224849
bugzilla.suse.com/1224854
bugzilla.suse.com/1224859
bugzilla.suse.com/1224882
bugzilla.suse.com/1224888
bugzilla.suse.com/1224889
bugzilla.suse.com/1224891
bugzilla.suse.com/1224892
bugzilla.suse.com/1224893
bugzilla.suse.com/1224904
bugzilla.suse.com/1224907
bugzilla.suse.com/1224909
bugzilla.suse.com/1224916
bugzilla.suse.com/1224917
bugzilla.suse.com/1224922
bugzilla.suse.com/1224923
bugzilla.suse.com/1224924
bugzilla.suse.com/1224928
bugzilla.suse.com/1224953
bugzilla.suse.com/1224954
bugzilla.suse.com/1224961
bugzilla.suse.com/1224963
bugzilla.suse.com/1224965
bugzilla.suse.com/1224966
bugzilla.suse.com/1224968
bugzilla.suse.com/1224981
bugzilla.suse.com/1224982
bugzilla.suse.com/1224984
bugzilla.suse.com/1224987
bugzilla.suse.com/1224990
bugzilla.suse.com/1224993
bugzilla.suse.com/1224996
bugzilla.suse.com/1224997
bugzilla.suse.com/1225026
bugzilla.suse.com/1225030
bugzilla.suse.com/1225058
bugzilla.suse.com/1225060
bugzilla.suse.com/1225084
bugzilla.suse.com/1225091
bugzilla.suse.com/1225112
bugzilla.suse.com/1225113
bugzilla.suse.com/1225140
bugzilla.suse.com/1225143
bugzilla.suse.com/1225164
bugzilla.suse.com/1225177
bugzilla.suse.com/1225181
bugzilla.suse.com/1225192
bugzilla.suse.com/1225193
bugzilla.suse.com/1225201
bugzilla.suse.com/1225206
bugzilla.suse.com/1225207
bugzilla.suse.com/1225208
bugzilla.suse.com/1225214
bugzilla.suse.com/1225223
bugzilla.suse.com/1225224
bugzilla.suse.com/1225232
bugzilla.suse.com/1225238
bugzilla.suse.com/1225244
bugzilla.suse.com/1225251
bugzilla.suse.com/1225256
bugzilla.suse.com/1225261
bugzilla.suse.com/1225262
bugzilla.suse.com/1225263
bugzilla.suse.com/1225301
bugzilla.suse.com/1225303
bugzilla.suse.com/1225318
bugzilla.suse.com/1225321
bugzilla.suse.com/1225326
bugzilla.suse.com/1225327
bugzilla.suse.com/1225328
bugzilla.suse.com/1225336
bugzilla.suse.com/1225341
bugzilla.suse.com/1225346
bugzilla.suse.com/1225351
bugzilla.suse.com/1225354
bugzilla.suse.com/1225355
bugzilla.suse.com/1225360
bugzilla.suse.com/1225366
bugzilla.suse.com/1225367
bugzilla.suse.com/1225384
bugzilla.suse.com/1225390
bugzilla.suse.com/1225393
bugzilla.suse.com/1225400
bugzilla.suse.com/1225404
bugzilla.suse.com/1225411
bugzilla.suse.com/1225427
bugzilla.suse.com/1225437
bugzilla.suse.com/1225448
bugzilla.suse.com/1225453
bugzilla.suse.com/1225455
bugzilla.suse.com/1225499
bugzilla.suse.com/1225500
bugzilla.suse.com/1225534
lists.suse.com/pipermail/sle-updates/2024-June/035717.html
www.suse.com/security/cve/CVE-2021-3743
www.suse.com/security/cve/CVE-2021-39698
www.suse.com/security/cve/CVE-2021-43056
www.suse.com/security/cve/CVE-2021-43527
www.suse.com/security/cve/CVE-2021-47104
www.suse.com/security/cve/CVE-2021-47220
www.suse.com/security/cve/CVE-2021-47229
www.suse.com/security/cve/CVE-2021-47231
www.suse.com/security/cve/CVE-2021-47236
www.suse.com/security/cve/CVE-2021-47239
www.suse.com/security/cve/CVE-2021-47240
www.suse.com/security/cve/CVE-2021-47246
www.suse.com/security/cve/CVE-2021-47252
www.suse.com/security/cve/CVE-2021-47254
www.suse.com/security/cve/CVE-2021-47255
www.suse.com/security/cve/CVE-2021-47259
www.suse.com/security/cve/CVE-2021-47260
www.suse.com/security/cve/CVE-2021-47261
www.suse.com/security/cve/CVE-2021-47267
www.suse.com/security/cve/CVE-2021-47269
www.suse.com/security/cve/CVE-2021-47270
www.suse.com/security/cve/CVE-2021-47274
www.suse.com/security/cve/CVE-2021-47275
www.suse.com/security/cve/CVE-2021-47276
www.suse.com/security/cve/CVE-2021-47280
www.suse.com/security/cve/CVE-2021-47284
www.suse.com/security/cve/CVE-2021-47285
www.suse.com/security/cve/CVE-2021-47288
www.suse.com/security/cve/CVE-2021-47289
www.suse.com/security/cve/CVE-2021-47296
www.suse.com/security/cve/CVE-2021-47301
www.suse.com/security/cve/CVE-2021-47302
www.suse.com/security/cve/CVE-2021-47305
www.suse.com/security/cve/CVE-2021-47307
www.suse.com/security/cve/CVE-2021-47308
www.suse.com/security/cve/CVE-2021-47314
www.suse.com/security/cve/CVE-2021-47315
www.suse.com/security/cve/CVE-2021-47320
www.suse.com/security/cve/CVE-2021-47321
www.suse.com/security/cve/CVE-2021-47323
www.suse.com/security/cve/CVE-2021-47324
www.suse.com/security/cve/CVE-2021-47330
www.suse.com/security/cve/CVE-2021-47332
www.suse.com/security/cve/CVE-2021-47333
www.suse.com/security/cve/CVE-2021-47334
www.suse.com/security/cve/CVE-2021-47338
www.suse.com/security/cve/CVE-2021-47341
www.suse.com/security/cve/CVE-2021-47344
www.suse.com/security/cve/CVE-2021-47347
www.suse.com/security/cve/CVE-2021-47350
www.suse.com/security/cve/CVE-2021-47354
www.suse.com/security/cve/CVE-2021-47356
www.suse.com/security/cve/CVE-2021-47369
www.suse.com/security/cve/CVE-2021-47375
www.suse.com/security/cve/CVE-2021-47378
www.suse.com/security/cve/CVE-2021-47381
www.suse.com/security/cve/CVE-2021-47382
www.suse.com/security/cve/CVE-2021-47383
www.suse.com/security/cve/CVE-2021-47388
www.suse.com/security/cve/CVE-2021-47391
www.suse.com/security/cve/CVE-2021-47393
www.suse.com/security/cve/CVE-2021-47395
www.suse.com/security/cve/CVE-2021-47396
www.suse.com/security/cve/CVE-2021-47399
www.suse.com/security/cve/CVE-2021-47402
www.suse.com/security/cve/CVE-2021-47404
www.suse.com/security/cve/CVE-2021-47405
www.suse.com/security/cve/CVE-2021-47416
www.suse.com/security/cve/CVE-2021-47423
www.suse.com/security/cve/CVE-2021-47424
www.suse.com/security/cve/CVE-2021-47425
www.suse.com/security/cve/CVE-2021-47431
www.suse.com/security/cve/CVE-2021-47434
www.suse.com/security/cve/CVE-2021-47436
www.suse.com/security/cve/CVE-2021-47441
www.suse.com/security/cve/CVE-2021-47442
www.suse.com/security/cve/CVE-2021-47443
www.suse.com/security/cve/CVE-2021-47445
www.suse.com/security/cve/CVE-2021-47456
www.suse.com/security/cve/CVE-2021-47460
www.suse.com/security/cve/CVE-2021-47464
www.suse.com/security/cve/CVE-2021-47465
www.suse.com/security/cve/CVE-2021-47468
www.suse.com/security/cve/CVE-2021-47473
www.suse.com/security/cve/CVE-2021-47482
www.suse.com/security/cve/CVE-2021-47483
www.suse.com/security/cve/CVE-2021-47485
www.suse.com/security/cve/CVE-2021-47495
www.suse.com/security/cve/CVE-2021-47496
www.suse.com/security/cve/CVE-2021-47497
www.suse.com/security/cve/CVE-2021-47500
www.suse.com/security/cve/CVE-2021-47505
www.suse.com/security/cve/CVE-2021-47506
www.suse.com/security/cve/CVE-2021-47511
www.suse.com/security/cve/CVE-2021-47516
www.suse.com/security/cve/CVE-2021-47522
www.suse.com/security/cve/CVE-2021-47538
www.suse.com/security/cve/CVE-2021-47541
www.suse.com/security/cve/CVE-2021-47542
www.suse.com/security/cve/CVE-2021-47562
www.suse.com/security/cve/CVE-2021-47563
www.suse.com/security/cve/CVE-2021-47565
www.suse.com/security/cve/CVE-2022-20132
www.suse.com/security/cve/CVE-2022-48673
www.suse.com/security/cve/CVE-2023-0160
www.suse.com/security/cve/CVE-2023-1829
www.suse.com/security/cve/CVE-2023-2176
www.suse.com/security/cve/CVE-2023-4244
www.suse.com/security/cve/CVE-2023-47233
www.suse.com/security/cve/CVE-2023-52433
www.suse.com/security/cve/CVE-2023-52581
www.suse.com/security/cve/CVE-2023-52591
www.suse.com/security/cve/CVE-2023-52654
www.suse.com/security/cve/CVE-2023-52655
www.suse.com/security/cve/CVE-2023-52686
www.suse.com/security/cve/CVE-2023-52840
www.suse.com/security/cve/CVE-2023-52871
www.suse.com/security/cve/CVE-2023-52880
www.suse.com/security/cve/CVE-2023-6531
www.suse.com/security/cve/CVE-2024-26581
www.suse.com/security/cve/CVE-2024-26643
www.suse.com/security/cve/CVE-2024-26828
www.suse.com/security/cve/CVE-2024-26925
www.suse.com/security/cve/CVE-2024-26929
www.suse.com/security/cve/CVE-2024-26930
www.suse.com/security/cve/CVE-2024-27398
www.suse.com/security/cve/CVE-2024-27413
www.suse.com/security/cve/CVE-2024-35811
www.suse.com/security/cve/CVE-2024-35895
www.suse.com/security/cve/CVE-2024-35914
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.1%