SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2948-1)

high Nessus Plugin ID 205733

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2948-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).
- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1227810

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227976

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228040

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228644

https://bugzilla.suse.com/1228743

http://www.nessus.org/u?65c4e958

https://www.suse.com/security/cve/CVE-2020-26558

https://www.suse.com/security/cve/CVE-2021-0129

https://www.suse.com/security/cve/CVE-2021-47126

https://www.suse.com/security/cve/CVE-2021-47219

https://www.suse.com/security/cve/CVE-2021-47291

https://www.suse.com/security/cve/CVE-2021-47506

https://www.suse.com/security/cve/CVE-2021-47520

https://www.suse.com/security/cve/CVE-2021-47580

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26585

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-40956

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-41069

https://www.suse.com/security/cve/CVE-2024-41090

https://www.suse.com/security/cve/CVE-2024-42145

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1179610

https://bugzilla.suse.com/1186463

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1220187

https://bugzilla.suse.com/1221539

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1222824

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1224918

https://bugzilla.suse.com/1225404

https://bugzilla.suse.com/1225431

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226550

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1226575

https://bugzilla.suse.com/1226662

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1227213

https://bugzilla.suse.com/1227362

https://bugzilla.suse.com/1227487

https://www.suse.com/security/cve/CVE-2021-47598

https://www.suse.com/security/cve/CVE-2021-47600

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2022-48822

https://www.suse.com/security/cve/CVE-2023-52686

https://www.suse.com/security/cve/CVE-2023-52885

Plugin Details

Severity: High

ID: 205733

File Name: suse_SU-2024-2948-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 8/17/2024

Updated: 9/9/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2020-26558

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-41011

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_170-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/16/2024

Vulnerability Publication Date: 5/24/2021

Reference Information

CVE: CVE-2020-26558, CVE-2021-0129, CVE-2021-47126, CVE-2021-47219, CVE-2021-47291, CVE-2021-47506, CVE-2021-47520, CVE-2021-47580, CVE-2021-47598, CVE-2021-47600, CVE-2022-48792, CVE-2022-48821, CVE-2022-48822, CVE-2023-52686, CVE-2023-52885, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26800, CVE-2024-36974, CVE-2024-38559, CVE-2024-39494, CVE-2024-40937, CVE-2024-40956, CVE-2024-41011, CVE-2024-41059, CVE-2024-41069, CVE-2024-41090, CVE-2024-42145

SuSE: SUSE-SU-2024:2948-1