7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
22.0%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.4.2024.1979.1");
script_cve_id("CVE-2021-46933", "CVE-2021-47074", "CVE-2021-47162", "CVE-2021-47171", "CVE-2021-47188", "CVE-2021-47206", "CVE-2021-47220", "CVE-2021-47229", "CVE-2021-47231", "CVE-2021-47235", "CVE-2021-47236", "CVE-2021-47237", "CVE-2021-47238", "CVE-2021-47239", "CVE-2021-47245", "CVE-2021-47246", "CVE-2021-47248", "CVE-2021-47249", "CVE-2021-47250", "CVE-2021-47252", "CVE-2021-47254", "CVE-2021-47258", "CVE-2021-47260", "CVE-2021-47261", "CVE-2021-47265", "CVE-2021-47269", "CVE-2021-47274", "CVE-2021-47276", "CVE-2021-47277", "CVE-2021-47280", "CVE-2021-47281", "CVE-2021-47284", "CVE-2021-47285", "CVE-2021-47288", "CVE-2021-47301", "CVE-2021-47302", "CVE-2021-47305", "CVE-2021-47307", "CVE-2021-47308", "CVE-2021-47310", "CVE-2021-47311", "CVE-2021-47314", "CVE-2021-47315", "CVE-2021-47319", "CVE-2021-47320", "CVE-2021-47321", "CVE-2021-47323", "CVE-2021-47324", "CVE-2021-47330", "CVE-2021-47334", "CVE-2021-47337", "CVE-2021-47343", "CVE-2021-47344", "CVE-2021-47345", "CVE-2021-47347", "CVE-2021-47352", "CVE-2021-47353", "CVE-2021-47355", "CVE-2021-47356", "CVE-2021-47357", "CVE-2021-47361", "CVE-2021-47362", "CVE-2021-47369", "CVE-2021-47375", "CVE-2021-47378", "CVE-2021-47382", "CVE-2021-47383", "CVE-2021-47391", "CVE-2021-47397", "CVE-2021-47400", "CVE-2021-47401", "CVE-2021-47404", "CVE-2021-47409", "CVE-2021-47416", "CVE-2021-47423", "CVE-2021-47424", "CVE-2021-47431", "CVE-2021-47435", "CVE-2021-47436", "CVE-2021-47456", "CVE-2021-47458", "CVE-2021-47460", "CVE-2021-47469", "CVE-2021-47472", "CVE-2021-47473", "CVE-2021-47478", "CVE-2021-47480", "CVE-2021-47483", "CVE-2021-47485", "CVE-2021-47495", "CVE-2021-47496", "CVE-2021-47497", "CVE-2021-47500", "CVE-2021-47506", "CVE-2021-47509", "CVE-2021-47511", "CVE-2021-47523", "CVE-2021-47541", "CVE-2021-47548", "CVE-2021-47565", "CVE-2022-48686", "CVE-2022-48697", "CVE-2022-48704", "CVE-2022-48708", "CVE-2022-48710", "CVE-2023-0160", "CVE-2023-1829", "CVE-2023-42755", "CVE-2023-47233", "CVE-2023-52527", "CVE-2023-52586", "CVE-2023-52591", "CVE-2023-52655", "CVE-2023-52664", "CVE-2023-52685", "CVE-2023-52686", "CVE-2023-52691", "CVE-2023-52696", "CVE-2023-52698", "CVE-2023-52703", "CVE-2023-52730", "CVE-2023-52732", "CVE-2023-52741", "CVE-2023-52742", "CVE-2023-52747", "CVE-2023-52759", "CVE-2023-52774", "CVE-2023-52781", "CVE-2023-52796", "CVE-2023-52803", "CVE-2023-52821", "CVE-2023-52864", "CVE-2023-52865", "CVE-2023-52867", "CVE-2023-52875", "CVE-2023-52880", "CVE-2024-26625", "CVE-2024-26752", "CVE-2024-26775", "CVE-2024-26828", "CVE-2024-26846", "CVE-2024-26874", "CVE-2024-26900", "CVE-2024-26915", "CVE-2024-26920", "CVE-2024-26921", "CVE-2024-26934", "CVE-2024-26957", "CVE-2024-26958", "CVE-2024-26984", "CVE-2024-26996", "CVE-2024-27059", "CVE-2024-27062", "CVE-2024-27396", "CVE-2024-27398", "CVE-2024-27401", "CVE-2024-27419", "CVE-2024-27436", "CVE-2024-35789", "CVE-2024-35791", "CVE-2024-35809", "CVE-2024-35811", "CVE-2024-35830", "CVE-2024-35849", "CVE-2024-35877", "CVE-2024-35878", "CVE-2024-35887", "CVE-2024-35895", "CVE-2024-35914", "CVE-2024-35932", "CVE-2024-35935", "CVE-2024-35936", "CVE-2024-35944", "CVE-2024-35955", "CVE-2024-35969", "CVE-2024-35982", "CVE-2024-35984", "CVE-2024-36015", "CVE-2024-36029", "CVE-2024-36954");
script_tag(name:"creation_date", value:"2024-06-12 04:25:31 +0000 (Wed, 12 Jun 2024)");
script_version("2024-06-12T05:05:44+0000");
script_tag(name:"last_modification", value:"2024-06-12 05:05:44 +0000 (Wed, 12 Jun 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-05-23 19:13:43 +0000 (Thu, 23 May 2024)");
script_name("SUSE: Security Advisory (SUSE-SU-2024:1979-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("SuSE Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES12\.0SP5)");
script_xref(name:"Advisory-ID", value:"SUSE-SU-2024:1979-1");
script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2024/suse-su-20241979-1/");
script_tag(name:"summary", value:"The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2024:1979-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
CVE-2023-42755: Check user supplied offsets (bsc#1215702).
CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).
CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)
CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
CVE-2021-47352: Add validation for used length (bsc#1225124).
CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
CVE-2021-47423: Fix file release memory leak (bsc#1225366).
CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).
CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
CVE-2021-47401: Fix stack information leak (bsc#1225242).
CVE-2023-52867: Fix possible ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'Linux Kernel' package(s) on SUSE Linux Enterprise High Performance Computing 12-SP5, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "SLES12.0SP5") {
if(!isnull(res = isrpmvuln(pkg:"kernel-azure", rpm:"kernel-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base", rpm:"kernel-azure-base~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base-debuginfo", rpm:"kernel-azure-base-debuginfo~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debuginfo", rpm:"kernel-azure-debuginfo~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debugsource", rpm:"kernel-azure-debugsource~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-azure-devel", rpm:"kernel-azure-devel~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-devel-azure", rpm:"kernel-devel-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-source-azure", rpm:"kernel-source-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"kernel-syms-azure", rpm:"kernel-syms-azure~4.12.14~16.188.1", rls:"SLES12.0SP5"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
22.0%