SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2923-1)

high Nessus Plugin ID 205649

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2923-1 advisory.

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).
- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).
- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2024-26583: tls: fix use-after-free on failed backlog decryption (bsc#1220185).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227976

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228644

https://bugzilla.suse.com/1228743

http://www.nessus.org/u?2074d970

https://www.suse.com/security/cve/CVE-2020-26558

https://www.suse.com/security/cve/CVE-2021-0129

https://www.suse.com/security/cve/CVE-2021-47126

https://www.suse.com/security/cve/CVE-2021-47219

https://www.suse.com/security/cve/CVE-2021-47291

https://www.suse.com/security/cve/CVE-2021-47506

https://www.suse.com/security/cve/CVE-2021-47520

https://www.suse.com/security/cve/CVE-2021-47580

https://www.suse.com/security/cve/CVE-2021-47598

https://www.suse.com/security/cve/CVE-2021-47600

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2023-52686

https://www.suse.com/security/cve/CVE-2023-52885

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26585

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1179610

https://bugzilla.suse.com/1186463

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1220187

https://bugzilla.suse.com/1221539

https://bugzilla.suse.com/1222824

https://bugzilla.suse.com/1224682

https://bugzilla.suse.com/1224918

https://bugzilla.suse.com/1225404

https://bugzilla.suse.com/1225431

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226550

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1226575

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1226758

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1227213

https://www.suse.com/security/cve/CVE-2024-42145

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-41069

https://www.suse.com/security/cve/CVE-2024-41090

Plugin Details

Severity: High

ID: 205649

File Name: suse_SU-2024-2923-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/16/2024

Updated: 9/9/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2020-26558

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-41011

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150200_24_200-default, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/15/2024

Vulnerability Publication Date: 5/24/2021

Reference Information

CVE: CVE-2020-26558, CVE-2021-0129, CVE-2021-47126, CVE-2021-47219, CVE-2021-47291, CVE-2021-47506, CVE-2021-47520, CVE-2021-47580, CVE-2021-47598, CVE-2021-47600, CVE-2022-48792, CVE-2022-48821, CVE-2023-52686, CVE-2023-52885, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-36974, CVE-2024-38559, CVE-2024-39494, CVE-2024-40937, CVE-2024-41011, CVE-2024-41059, CVE-2024-41069, CVE-2024-41090, CVE-2024-42145

SuSE: SUSE-SU-2024:2923-1