SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2948-1)

high Nessus Plugin ID 205733

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2948-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).
- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).

The following non-security bugs were fixed:

- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213)
- nfs: Clean up directory array handling (bsc#1226662).
- nfs: Clean up nfs_readdir_page_filler() (bsc#1226662).
- nfs: Clean up readdir struct nfs_cache_array (bsc#1226662).
- nfs: Do not discard readdir results (bsc#1226662).
- nfs: Do not overfill uncached readdir pages (bsc#1226662).
- nfs: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- nfs: Ensure contents of struct nfs_open_dir_context are consistent (bsc#1226662).
- nfs: Fix up directory verifier races (bsc#1226662).
- nfs: Further optimisations for 'ls -l' (bsc#1226662).
- nfs: More readdir cleanups (bsc#1226662).
- nfs: Reduce number of RPC calls when doing uncached readdir (bsc#1226662).
- nfs: Reduce use of uncached readdir (bsc#1226662).
- nfs: Support larger readdir buffers (bsc#1226662).
- nfs: Use the 64-bit server readdir cookies when possible (bsc#1226662).
- nfs: optimise readdir cache page invalidation (bsc#1226662).
- nfsv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- x.509: Fix the parser of extended key usage for length (bsc#1218820, bsc#1226666).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1179610

https://bugzilla.suse.com/1186463

https://www.suse.com/security/cve/CVE-2020-26558

https://www.suse.com/security/cve/CVE-2021-0129

https://bugzilla.suse.com/1220187

https://www.suse.com/security/cve/CVE-2024-26585

https://bugzilla.suse.com/1222824

https://www.suse.com/security/cve/CVE-2021-47219

https://bugzilla.suse.com/1225404

https://www.suse.com/security/cve/CVE-2021-47506

https://www.suse.com/security/cve/CVE-2023-52686

https://bugzilla.suse.com/1225431

https://www.suse.com/security/cve/CVE-2021-47520

https://bugzilla.suse.com/1226575

https://www.suse.com/security/cve/CVE-2021-47600

https://www.suse.com/security/cve/CVE-2024-38559

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1226550

https://bugzilla.suse.com/1226785

https://www.suse.com/security/cve/CVE-2021-47580

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1227362

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1228328

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41090

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1227213

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228743

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2023-52885

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-42145

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1227810

https://bugzilla.suse.com/1227976

https://bugzilla.suse.com/1228040

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228644

https://www.suse.com/security/cve/CVE-2021-47598

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2022-48822

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-40956

https://www.suse.com/security/cve/CVE-2024-41069

https://bugzilla.suse.com/1221539

https://bugzilla.suse.com/1224918

https://bugzilla.suse.com/1226666

https://www.suse.com/security/cve/CVE-2021-47126

https://www.suse.com/security/cve/CVE-2021-47291

https://bugzilla.suse.com/1226662

http://www.nessus.org/u?65c4e958

Plugin Details

Severity: High

ID: 205733

File Name: suse_SU-2024-2948-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 8/17/2024

Updated: 8/17/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2020-26558

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-39494

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_170-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/16/2024

Vulnerability Publication Date: 5/24/2021

Reference Information

CVE: CVE-2020-26558, CVE-2021-0129, CVE-2021-47126, CVE-2021-47219, CVE-2021-47291, CVE-2021-47506, CVE-2021-47520, CVE-2021-47580, CVE-2021-47598, CVE-2021-47600, CVE-2022-48792, CVE-2022-48821, CVE-2022-48822, CVE-2023-52686, CVE-2023-52885, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26800, CVE-2024-36974, CVE-2024-38559, CVE-2024-39494, CVE-2024-40937, CVE-2024-40956, CVE-2024-41011, CVE-2024-41059, CVE-2024-41069, CVE-2024-41090, CVE-2024-42145

SuSE: SUSE-SU-2024:2948-1