Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:13614125623114202423601
HistoryJul 10, 2024 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2024:2360-1)

2024-07-1000:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
9
suse
security advisory
greenbone ag
gpl-2.0
cve-2020-10135
cve-2021-43389
cve-2021-4439
cvss
nvd
sles12.0sp5

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.009

Percentile

83.5%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2024.2360.1");
  script_cve_id("CVE-2020-10135", "CVE-2021-43389", "CVE-2021-4439", "CVE-2021-47103", "CVE-2021-47191", "CVE-2021-47193", "CVE-2021-47267", "CVE-2021-47270", "CVE-2021-47293", "CVE-2021-47294", "CVE-2021-47297", "CVE-2021-47309", "CVE-2021-47328", "CVE-2021-47354", "CVE-2021-47372", "CVE-2021-47379", "CVE-2021-47407", "CVE-2021-47418", "CVE-2021-47434", "CVE-2021-47445", "CVE-2021-47518", "CVE-2021-47544", "CVE-2021-47566", "CVE-2021-47571", "CVE-2021-47576", "CVE-2021-47587", "CVE-2021-47589", "CVE-2021-47600", "CVE-2021-47602", "CVE-2021-47603", "CVE-2021-47609", "CVE-2021-47617", "CVE-2022-0435", "CVE-2022-22942", "CVE-2022-48711", "CVE-2022-48715", "CVE-2022-48722", "CVE-2022-48732", "CVE-2022-48733", "CVE-2022-48740", "CVE-2022-48743", "CVE-2022-48754", "CVE-2022-48756", "CVE-2022-48758", "CVE-2022-48759", "CVE-2022-48760", "CVE-2022-48761", "CVE-2022-48771", "CVE-2022-48772", "CVE-2023-24023", "CVE-2023-52622", "CVE-2023-52675", "CVE-2023-52737", "CVE-2023-52752", "CVE-2023-52754", "CVE-2023-52757", "CVE-2023-52762", "CVE-2023-52764", "CVE-2023-52784", "CVE-2023-52808", "CVE-2023-52809", "CVE-2023-5281", "CVE-2023-52832", "CVE-2023-52834", "CVE-2023-52835", "CVE-2023-52843", "CVE-2023-52845", "CVE-2023-52855", "CVE-2023-52881", "CVE-2024-26633", "CVE-2024-26641", "CVE-2024-26679", "CVE-2024-26687", "CVE-2024-26720", "CVE-2024-26813", "CVE-2024-26845", "CVE-2024-26863", "CVE-2024-26894", "CVE-2024-26923", "CVE-2024-26928", "CVE-2024-26973", "CVE-2024-27399", "CVE-2024-27410", "CVE-2024-35247", "CVE-2024-35807", "CVE-2024-35822", "CVE-2024-35835", "CVE-2024-35862", "CVE-2024-35863", "CVE-2024-35864", "CVE-2024-35865", "CVE-2024-35867", "CVE-2024-35868", "CVE-2024-35870", "CVE-2024-35886", "CVE-2024-35896", "CVE-2024-35922", "CVE-2024-35925", "CVE-2024-35930", "CVE-2024-35950", "CVE-2024-35956", "CVE-2024-35958", "CVE-2024-35960", "CVE-2024-35962", "CVE-2024-35976", "CVE-2024-35979", "CVE-2024-35997", "CVE-2024-35998", "CVE-2024-36016", "CVE-2024-36017", "CVE-2024-36025", "CVE-2024-36479", "CVE-2024-36592", "CVE-2024-36880", "CVE-2024-36894", "CVE-2024-36915", "CVE-2024-36917", "CVE-2024-36919", "CVE-2024-36923", "CVE-2024-36934", "CVE-2024-36938", "CVE-2024-36940", "CVE-2024-36949", "CVE-2024-36950", "CVE-2024-36960", "CVE-2024-36964", "CVE-2024-37021", "CVE-2024-37354", "CVE-2024-38544", "CVE-2024-38545", "CVE-2024-38546", "CVE-2024-38549", "CVE-2024-38552", "CVE-2024-38553", "CVE-2024-38565", "CVE-2024-38567", "CVE-2024-38578", "CVE-2024-38579", "CVE-2024-38580", "CVE-2024-38597", "CVE-2024-38601", "CVE-2024-38608", "CVE-2024-38618", "CVE-2024-38621", "CVE-2024-38627", "CVE-2024-38659", "CVE-2024-38661", "CVE-2024-38780");
  script_tag(name:"creation_date", value:"2024-07-10 04:28:31 +0000 (Wed, 10 Jul 2024)");
  script_version("2024-07-10T05:05:27+0000");
  script_tag(name:"last_modification", value:"2024-07-10 05:05:27 +0000 (Wed, 10 Jul 2024)");
  script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-10-02 17:16:52 +0000 (Mon, 02 Oct 2023)");

  script_name("SUSE: Security Advisory (SUSE-SU-2024:2360-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES12\.0SP5)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2024:2360-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2024/suse-su-20242360-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2024:2360-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:

CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
CVE-2021-47191: Fix out-of-bound read in resp_readcap16() (bsc#1222866).
CVE-2021-47267: usb: fix various gadget panics on 10gbps cabling (bsc#1224993).
CVE-2021-47270: usb: fix various gadgets null ptr deref on 10gbps cabling (bsc#1224997).
CVE-2021-47293: net/sched: act_skbmod: Skip non-Ethernet packets (bsc#1224978).
CVE-2021-47294: netrom: Decrease sock refcount when sock timers expire (bsc#1224977).
CVE-2021-47297: net: fix uninit-value in caif_seqpkt_sendmsg (bsc#1224976).
CVE-2021-47309: net: validate lwtstate->data before returning from skb_tunnel_info() (bsc#1224967).
CVE-2021-47354: drm/sched: Avoid data corruptions (bsc#1225140)
CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).
CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).
CVE-2021-47407: KVM: x86: Handle SRCU initialization failure during page track init (bsc#1225306).
CVE-2021-47418: net_sched: fix NULL deref in fifo_set_limit() (bsc#1225337).
CVE-2021-47434: xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1225232).
CVE-2021-47445: drm/msm: Fix null pointer dereference on pointer edp (bsc#1225261)
CVE-2021-47518: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done (bsc#1225372).
CVE-2021-47544: tcp: fix page frag corruption on page fault (bsc#1225463).
CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
CVE-2021-47587: net: systemport: Add global locking for descriptor lifecycle (bsc#1226567).
CVE-2021-47602: mac80211: track only QoS data frames for admission control (bsc#1226554).
CVE-2021-47609: firmware: arm_scpi: Fix string overflow in SCPI genpd driver (bsc#1226562)
CVE-2022-48732: drm/nouveau: fix off by one in BIOS boundary checking (bsc#1226716)
CVE-2022-48733: btrfs: fix use-after-free after failure to create a snapshot (bsc#1226718).
CVE-2022-48740: selinux: fix double free of cond_list on error paths (bsc#1226699).
CVE-2022-48743: net: amd-xgbe: Fix skb data length underflow (bsc#1226705).
CVE-2022-48756: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (bsc#1226698)
CVE-2022-48759: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (bsc#1226711).
CVE-2022-48761: usb: xhci-plat: fix crash when suspend if remote wake enable (bsc#1226701).
CVE-2022-48772: media: lgdt3306a: Add a check against null-pointer-def (bsc#1226976).
CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
CVE-2023-52737: btrfs: ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'Linux Kernel' package(s) on SUSE Linux Enterprise High Performance Computing 12-SP5, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES12.0SP5") {

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure", rpm:"kernel-azure~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base", rpm:"kernel-azure-base~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-base-debuginfo", rpm:"kernel-azure-base-debuginfo~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debuginfo", rpm:"kernel-azure-debuginfo~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-debugsource", rpm:"kernel-azure-debugsource~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-azure-devel", rpm:"kernel-azure-devel~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-devel-azure", rpm:"kernel-devel-azure~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-source-azure", rpm:"kernel-source-azure~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-syms-azure", rpm:"kernel-syms-azure~4.12.14~16.191.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.009

Percentile

83.5%