SUSE SLES15 Security Update : kernel (SUSE-SU-2024:3249-1)

high Nessus Plugin ID 207333

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3249-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2022-48919: Fix double free race when mount fails in cifs_get_root() (bsc#1229657).
- CVE-2023-52854: Fix refcnt handling in padata_free_shell() (bsc#1225584).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2022-48872: Fix use-after-free race condition for maps (bsc#1229510).
- CVE-2022-48873: Do not remove map on creater_process and device_release (bsc#1229512).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1176447

https://bugzilla.suse.com/1195668

https://bugzilla.suse.com/1195928

https://bugzilla.suse.com/1195957

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1196516

https://bugzilla.suse.com/1196823

https://bugzilla.suse.com/1202346

https://bugzilla.suse.com/1209636

https://bugzilla.suse.com/1209799

https://bugzilla.suse.com/1210629

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1222251

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1223948

https://bugzilla.suse.com/1225109

https://bugzilla.suse.com/1225584

https://bugzilla.suse.com/1227832

https://bugzilla.suse.com/1227924

https://bugzilla.suse.com/1227928

https://bugzilla.suse.com/1227932

https://bugzilla.suse.com/1227935

https://bugzilla.suse.com/1227941

https://bugzilla.suse.com/1227942

https://bugzilla.suse.com/1227945

https://bugzilla.suse.com/1227952

https://bugzilla.suse.com/1227964

https://bugzilla.suse.com/1227969

https://bugzilla.suse.com/1227985

https://bugzilla.suse.com/1227987

https://bugzilla.suse.com/1227988

https://bugzilla.suse.com/1227989

https://bugzilla.suse.com/1227997

https://bugzilla.suse.com/1228000

https://bugzilla.suse.com/1228002

https://bugzilla.suse.com/1228004

https://bugzilla.suse.com/1228005

https://bugzilla.suse.com/1228006

https://bugzilla.suse.com/1228015

https://bugzilla.suse.com/1228020

https://bugzilla.suse.com/1228037

https://bugzilla.suse.com/1228045

https://bugzilla.suse.com/1228060

https://bugzilla.suse.com/1228062

https://bugzilla.suse.com/1228066

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228516

https://bugzilla.suse.com/1228576

https://bugzilla.suse.com/1228959

https://bugzilla.suse.com/1229400

https://bugzilla.suse.com/1229454

https://bugzilla.suse.com/1229500

https://bugzilla.suse.com/1229503

https://bugzilla.suse.com/1229510

https://bugzilla.suse.com/1229512

https://bugzilla.suse.com/1229598

https://bugzilla.suse.com/1229604

https://bugzilla.suse.com/1229607

https://bugzilla.suse.com/1229620

https://bugzilla.suse.com/1229621

https://bugzilla.suse.com/1229624

https://bugzilla.suse.com/1229626

https://bugzilla.suse.com/1229629

https://bugzilla.suse.com/1229630

https://www.suse.com/security/cve/CVE-2022-0854

https://www.suse.com/security/cve/CVE-2022-20368

https://www.suse.com/security/cve/CVE-2022-28748

https://www.suse.com/security/cve/CVE-2022-2964

https://www.suse.com/security/cve/CVE-2022-48686

https://www.suse.com/security/cve/CVE-2022-48775

https://www.suse.com/security/cve/CVE-2022-48778

https://www.suse.com/security/cve/CVE-2022-48787

https://www.suse.com/security/cve/CVE-2022-48788

https://bugzilla.suse.com/1229637

https://bugzilla.suse.com/1229641

https://bugzilla.suse.com/1229657

https://bugzilla.suse.com/1229707

http://www.nessus.org/u?1debe053

https://www.suse.com/security/cve/CVE-2021-4441

https://www.suse.com/security/cve/CVE-2022-48790

https://www.suse.com/security/cve/CVE-2022-48791

https://www.suse.com/security/cve/CVE-2022-48798

https://www.suse.com/security/cve/CVE-2022-48802

https://www.suse.com/security/cve/CVE-2022-48805

https://www.suse.com/security/cve/CVE-2022-48811

https://www.suse.com/security/cve/CVE-2022-48823

https://www.suse.com/security/cve/CVE-2022-48824

https://www.suse.com/security/cve/CVE-2022-48827

https://www.suse.com/security/cve/CVE-2022-48834

https://www.suse.com/security/cve/CVE-2022-48835

https://www.suse.com/security/cve/CVE-2022-48836

https://www.suse.com/security/cve/CVE-2022-48789

https://www.suse.com/security/cve/CVE-2022-48837

https://www.suse.com/security/cve/CVE-2022-48838

https://www.suse.com/security/cve/CVE-2022-48839

https://www.suse.com/security/cve/CVE-2022-48843

https://www.suse.com/security/cve/CVE-2022-48851

https://www.suse.com/security/cve/CVE-2022-48853

https://www.suse.com/security/cve/CVE-2022-48856

https://www.suse.com/security/cve/CVE-2022-48857

https://www.suse.com/security/cve/CVE-2022-48858

https://www.suse.com/security/cve/CVE-2022-48872

https://www.suse.com/security/cve/CVE-2022-48873

https://www.suse.com/security/cve/CVE-2022-48901

https://www.suse.com/security/cve/CVE-2022-48905

https://www.suse.com/security/cve/CVE-2022-48912

https://www.suse.com/security/cve/CVE-2022-48917

https://www.suse.com/security/cve/CVE-2022-48919

https://www.suse.com/security/cve/CVE-2022-48925

https://www.suse.com/security/cve/CVE-2022-48926

https://www.suse.com/security/cve/CVE-2022-48928

https://www.suse.com/security/cve/CVE-2022-48930

https://www.suse.com/security/cve/CVE-2022-48933

https://www.suse.com/security/cve/CVE-2022-48934

https://www.suse.com/security/cve/CVE-2023-1582

https://www.suse.com/security/cve/CVE-2023-2176

https://www.suse.com/security/cve/CVE-2023-52854

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-40910

https://www.suse.com/security/cve/CVE-2024-41009

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41062

https://www.suse.com/security/cve/CVE-2024-42077

https://www.suse.com/security/cve/CVE-2024-42232

https://www.suse.com/security/cve/CVE-2024-42271

https://www.suse.com/security/cve/CVE-2024-43861

https://www.suse.com/security/cve/CVE-2024-43882

https://www.suse.com/security/cve/CVE-2024-43883

https://www.suse.com/security/cve/CVE-2024-44947

Plugin Details

Severity: High

ID: 207333

File Name: suse_SU-2024-3249-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/17/2024

Updated: 9/17/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2022-0854

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-42271

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_174-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/16/2024

Vulnerability Publication Date: 3/7/2022

Reference Information

CVE: CVE-2021-4441, CVE-2022-0854, CVE-2022-20368, CVE-2022-28748, CVE-2022-2964, CVE-2022-48686, CVE-2022-48775, CVE-2022-48778, CVE-2022-48787, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48791, CVE-2022-48798, CVE-2022-48802, CVE-2022-48805, CVE-2022-48811, CVE-2022-48823, CVE-2022-48824, CVE-2022-48827, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48838, CVE-2022-48839, CVE-2022-48843, CVE-2022-48851, CVE-2022-48853, CVE-2022-48856, CVE-2022-48857, CVE-2022-48858, CVE-2022-48872, CVE-2022-48873, CVE-2022-48901, CVE-2022-48905, CVE-2022-48912, CVE-2022-48917, CVE-2022-48919, CVE-2022-48925, CVE-2022-48926, CVE-2022-48928, CVE-2022-48930, CVE-2022-48933, CVE-2022-48934, CVE-2023-1582, CVE-2023-2176, CVE-2023-52854, CVE-2024-26583, CVE-2024-26584, CVE-2024-26800, CVE-2024-40910, CVE-2024-41009, CVE-2024-41011, CVE-2024-41062, CVE-2024-42077, CVE-2024-42232, CVE-2024-42271, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44947

SuSE: SUSE-SU-2024:3249-1