SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2023:0394-1)

high Nessus Plugin ID 171475

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0394-1 advisory.

- The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated.
Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (CVE-2020-24588)

- A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side. (CVE-2022-4382)

- In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with tc qdisc and tc class commands. This affects qdisc_graft in net/sched/sch_api.c. (CVE-2022-47929)

- A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution. (CVE-2023-0179)

- A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.
SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e (CVE-2023-0266)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1185861

https://bugzilla.suse.com/1185863

https://bugzilla.suse.com/1186449

https://bugzilla.suse.com/1191256

https://bugzilla.suse.com/1192868

https://bugzilla.suse.com/1193629

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195175

https://bugzilla.suse.com/1195655

https://bugzilla.suse.com/1196058

https://bugzilla.suse.com/1199701

https://bugzilla.suse.com/1204063

https://bugzilla.suse.com/1204356

https://bugzilla.suse.com/1204662

https://bugzilla.suse.com/1205495

https://bugzilla.suse.com/1206006

https://bugzilla.suse.com/1206036

https://bugzilla.suse.com/1206056

https://bugzilla.suse.com/1206057

https://bugzilla.suse.com/1206258

https://bugzilla.suse.com/1206363

https://bugzilla.suse.com/1206459

https://bugzilla.suse.com/1206616

https://bugzilla.suse.com/1206677

https://bugzilla.suse.com/1206784

https://bugzilla.suse.com/1207010

https://bugzilla.suse.com/1207034

https://bugzilla.suse.com/1207134

https://bugzilla.suse.com/1207149

https://bugzilla.suse.com/1207158

https://bugzilla.suse.com/1207184

https://bugzilla.suse.com/1207186

https://bugzilla.suse.com/1207190

https://bugzilla.suse.com/1207237

https://bugzilla.suse.com/1207263

https://bugzilla.suse.com/1207269

https://bugzilla.suse.com/1207497

https://bugzilla.suse.com/1207500

https://bugzilla.suse.com/1207501

https://bugzilla.suse.com/1207506

https://bugzilla.suse.com/1207507

https://bugzilla.suse.com/1207734

https://bugzilla.suse.com/1207769

https://bugzilla.suse.com/1207842

https://bugzilla.suse.com/1207878

https://bugzilla.suse.com/1207933

https://www.suse.com/security/cve/CVE-2020-24588

https://www.suse.com/security/cve/CVE-2022-4382

https://www.suse.com/security/cve/CVE-2022-47929

https://www.suse.com/security/cve/CVE-2023-0179

https://www.suse.com/security/cve/CVE-2023-0266

http://www.nessus.org/u?63c8b7d8

Plugin Details

Severity: High

ID: 171475

File Name: suse_SU-2023-0394-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2/15/2023

Updated: 7/14/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Low

Base Score: 2.9

Temporal Score: 2.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2020-24588

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2023-0266

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/13/2023

Vulnerability Publication Date: 5/11/2021

CISA Known Exploited Vulnerability Due Dates: 4/20/2023

Reference Information

CVE: CVE-2020-24588, CVE-2022-4382, CVE-2022-47929, CVE-2023-0179, CVE-2023-0266

SuSE: SUSE-SU-2023:0394-1