SUSE SLES15 Security Update : kernel (SUSE-SU-2024:4131-1)

high Nessus Plugin ID 212537

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:4131-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1204171

https://www.suse.com/security/cve/CVE-2022-3435

https://www.suse.com/security/cve/CVE-2022-45934

https://bugzilla.suse.com/1205796

https://bugzilla.suse.com/1206188

https://bugzilla.suse.com/1206344

https://bugzilla.suse.com/1209290

https://www.suse.com/security/cve/CVE-2023-28327

https://bugzilla.suse.com/1210449

https://bugzilla.suse.com/1213034

https://bugzilla.suse.com/1210627

https://www.suse.com/security/cve/CVE-2023-2166

https://bugzilla.suse.com/1218562

https://www.suse.com/security/cve/CVE-2023-6270

https://bugzilla.suse.com/1216223

https://bugzilla.suse.com/1223824

https://www.suse.com/security/cve/CVE-2024-27043

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1225189

https://bugzilla.suse.com/1225336

https://www.suse.com/security/cve/CVE-2021-47416

https://www.suse.com/security/cve/CVE-2021-47534

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52800

https://bugzilla.suse.com/1225611

https://www.suse.com/security/cve/CVE-2023-52881

https://bugzilla.suse.com/1228743

https://www.suse.com/security/cve/CVE-2024-42145

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1229345

https://www.suse.com/security/cve/CVE-2024-43854

https://bugzilla.suse.com/1229454

https://www.suse.com/security/cve/CVE-2024-44947

https://bugzilla.suse.com/1229452

https://bugzilla.suse.com/1229456

https://bugzilla.suse.com/1231016

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1230442

https://bugzilla.suse.com/1230454

https://bugzilla.suse.com/1230715

https://www.suse.com/security/cve/CVE-2024-45013

https://www.suse.com/security/cve/CVE-2024-45026

https://www.suse.com/security/cve/CVE-2024-46716

https://bugzilla.suse.com/1230620

https://bugzilla.suse.com/1216813

https://bugzilla.suse.com/1223524

https://bugzilla.suse.com/1229556

https://bugzilla.suse.com/1230429

https://bugzilla.suse.com/1230600

https://bugzilla.suse.com/1230903

https://bugzilla.suse.com/1231073

https://bugzilla.suse.com/1231191

https://bugzilla.suse.com/1231193

https://bugzilla.suse.com/1231195

https://bugzilla.suse.com/1231197

https://bugzilla.suse.com/1231200

https://bugzilla.suse.com/1231203

https://bugzilla.suse.com/1231293

https://bugzilla.suse.com/1231375

https://bugzilla.suse.com/1231502

https://bugzilla.suse.com/1231673

https://bugzilla.suse.com/1231861

https://bugzilla.suse.com/1231883

https://bugzilla.suse.com/1231885

https://bugzilla.suse.com/1231887

https://bugzilla.suse.com/1231888

https://bugzilla.suse.com/1231890

https://bugzilla.suse.com/1231892

https://bugzilla.suse.com/1231893

https://bugzilla.suse.com/1231895

https://bugzilla.suse.com/1231896

https://bugzilla.suse.com/1231897

https://bugzilla.suse.com/1231929

https://bugzilla.suse.com/1231936

https://bugzilla.suse.com/1231937

https://bugzilla.suse.com/1231938

https://bugzilla.suse.com/1231939

https://bugzilla.suse.com/1231940

https://bugzilla.suse.com/1231941

https://bugzilla.suse.com/1231942

https://bugzilla.suse.com/1231958

https://bugzilla.suse.com/1231960

https://bugzilla.suse.com/1231961

https://bugzilla.suse.com/1231962

https://bugzilla.suse.com/1231972

https://bugzilla.suse.com/1231976

https://bugzilla.suse.com/1231979

https://bugzilla.suse.com/1231987

https://bugzilla.suse.com/1231988

https://bugzilla.suse.com/1231992

https://bugzilla.suse.com/1231995

https://bugzilla.suse.com/1231996

https://bugzilla.suse.com/1231997

https://bugzilla.suse.com/1232001

https://bugzilla.suse.com/1232005

https://bugzilla.suse.com/1232006

https://bugzilla.suse.com/1232007

https://bugzilla.suse.com/1232025

https://bugzilla.suse.com/1232026

https://bugzilla.suse.com/1232033

https://bugzilla.suse.com/1232035

https://bugzilla.suse.com/1232036

https://bugzilla.suse.com/1232037

https://bugzilla.suse.com/1232038

https://bugzilla.suse.com/1232039

https://bugzilla.suse.com/1232067

https://bugzilla.suse.com/1232069

https://bugzilla.suse.com/1232070

https://bugzilla.suse.com/1232071

https://bugzilla.suse.com/1232097

https://bugzilla.suse.com/1232108

https://bugzilla.suse.com/1232119

https://bugzilla.suse.com/1232120

https://bugzilla.suse.com/1232123

https://bugzilla.suse.com/1232133

https://bugzilla.suse.com/1232136

https://bugzilla.suse.com/1232145

https://bugzilla.suse.com/1232150

https://bugzilla.suse.com/1232163

https://bugzilla.suse.com/1232170

https://bugzilla.suse.com/1232172

https://bugzilla.suse.com/1232174

https://bugzilla.suse.com/1232229

https://bugzilla.suse.com/1232237

https://bugzilla.suse.com/1232260

https://bugzilla.suse.com/1232262

https://bugzilla.suse.com/1232282

https://bugzilla.suse.com/1232286

https://bugzilla.suse.com/1232304

https://bugzilla.suse.com/1232383

https://bugzilla.suse.com/1232395

https://bugzilla.suse.com/1232418

https://bugzilla.suse.com/1232424

https://bugzilla.suse.com/1232432

https://bugzilla.suse.com/1232519

https://www.suse.com/security/cve/CVE-2022-48664

https://www.suse.com/security/cve/CVE-2022-48879

https://www.suse.com/security/cve/CVE-2022-48946

https://www.suse.com/security/cve/CVE-2022-48947

https://www.suse.com/security/cve/CVE-2022-48948

https://www.suse.com/security/cve/CVE-2022-48949

https://www.suse.com/security/cve/CVE-2022-48951

https://www.suse.com/security/cve/CVE-2022-48953

https://www.suse.com/security/cve/CVE-2022-48954

https://www.suse.com/security/cve/CVE-2022-48955

https://www.suse.com/security/cve/CVE-2022-48956

https://www.suse.com/security/cve/CVE-2022-48959

https://www.suse.com/security/cve/CVE-2022-48960

https://www.suse.com/security/cve/CVE-2022-48961

https://www.suse.com/security/cve/CVE-2022-48962

https://www.suse.com/security/cve/CVE-2022-48967

https://www.suse.com/security/cve/CVE-2022-48968

https://www.suse.com/security/cve/CVE-2022-48969

https://www.suse.com/security/cve/CVE-2022-48970

https://www.suse.com/security/cve/CVE-2022-48971

https://www.suse.com/security/cve/CVE-2022-48972

https://www.suse.com/security/cve/CVE-2022-48973

https://www.suse.com/security/cve/CVE-2022-48975

https://www.suse.com/security/cve/CVE-2022-48977

https://www.suse.com/security/cve/CVE-2022-48978

https://www.suse.com/security/cve/CVE-2022-48981

https://www.suse.com/security/cve/CVE-2022-48985

https://www.suse.com/security/cve/CVE-2022-48987

https://www.suse.com/security/cve/CVE-2022-48988

https://www.suse.com/security/cve/CVE-2022-48991

https://www.suse.com/security/cve/CVE-2022-48992

https://www.suse.com/security/cve/CVE-2022-48994

https://www.suse.com/security/cve/CVE-2022-48995

https://www.suse.com/security/cve/CVE-2022-48997

https://www.suse.com/security/cve/CVE-2022-48999

https://www.suse.com/security/cve/CVE-2022-49000

https://www.suse.com/security/cve/CVE-2022-49002

https://www.suse.com/security/cve/CVE-2022-49003

https://www.suse.com/security/cve/CVE-2022-49005

https://www.suse.com/security/cve/CVE-2022-49006

https://www.suse.com/security/cve/CVE-2022-49007

https://www.suse.com/security/cve/CVE-2022-49010

https://www.suse.com/security/cve/CVE-2022-49011

https://www.suse.com/security/cve/CVE-2022-49012

https://www.suse.com/security/cve/CVE-2022-49014

https://www.suse.com/security/cve/CVE-2022-49015

https://www.suse.com/security/cve/CVE-2022-49016

https://www.suse.com/security/cve/CVE-2022-49019

https://www.suse.com/security/cve/CVE-2022-49021

https://www.suse.com/security/cve/CVE-2022-49022

https://www.suse.com/security/cve/CVE-2022-49023

https://www.suse.com/security/cve/CVE-2022-49024

https://www.suse.com/security/cve/CVE-2022-49025

https://www.suse.com/security/cve/CVE-2022-49026

https://www.suse.com/security/cve/CVE-2022-49027

https://www.suse.com/security/cve/CVE-2022-49028

https://www.suse.com/security/cve/CVE-2022-49029

https://www.suse.com/security/cve/CVE-2022-49031

https://www.suse.com/security/cve/CVE-2022-49032

https://www.suse.com/security/cve/CVE-2023-52919

https://www.suse.com/security/cve/CVE-2024-45016

https://www.suse.com/security/cve/CVE-2024-46813

https://www.suse.com/security/cve/CVE-2024-46814

https://www.suse.com/security/cve/CVE-2024-46815

https://www.suse.com/security/cve/CVE-2024-46816

https://www.suse.com/security/cve/CVE-2024-46817

https://www.suse.com/security/cve/CVE-2024-46818

https://www.suse.com/security/cve/CVE-2024-46849

https://www.suse.com/security/cve/CVE-2024-47668

https://www.suse.com/security/cve/CVE-2024-47674

https://www.suse.com/security/cve/CVE-2024-47684

https://www.suse.com/security/cve/CVE-2024-47706

https://www.suse.com/security/cve/CVE-2024-47747

https://www.suse.com/security/cve/CVE-2024-47748

https://www.suse.com/security/cve/CVE-2024-49860

https://www.suse.com/security/cve/CVE-2024-49867

https://www.suse.com/security/cve/CVE-2024-49930

https://www.suse.com/security/cve/CVE-2024-49936

https://www.suse.com/security/cve/CVE-2024-49960

https://www.suse.com/security/cve/CVE-2024-49969

https://www.suse.com/security/cve/CVE-2024-49974

https://www.suse.com/security/cve/CVE-2024-49982

https://www.suse.com/security/cve/CVE-2024-49991

https://www.suse.com/security/cve/CVE-2024-49995

https://www.suse.com/security/cve/CVE-2024-50047

https://bugzilla.suse.com/1231991

https://bugzilla.suse.com/1232165

https://bugzilla.suse.com/1232224

https://bugzilla.suse.com/1232281

https://bugzilla.suse.com/1232436

https://bugzilla.suse.com/1233117

http://www.nessus.org/u?aa9e9a80

https://www.suse.com/security/cve/CVE-2024-49925

https://www.suse.com/security/cve/CVE-2024-49945

https://www.suse.com/security/cve/CVE-2024-50208

Plugin Details

Severity: High

ID: 212537

File Name: suse_SU-2024-4131-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/12/2024

Updated: 12/12/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-50047

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_141-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/2/2024

Vulnerability Publication Date: 10/8/2022

Reference Information

CVE: CVE-2021-47416, CVE-2021-47534, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48981, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49019, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-42145, CVE-2024-43854, CVE-2024-44947, CVE-2024-45013, CVE-2024-45016, CVE-2024-45026, CVE-2024-46716, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-47748, CVE-2024-49860, CVE-2024-49867, CVE-2024-49925, CVE-2024-49930, CVE-2024-49936, CVE-2024-49945, CVE-2024-49960, CVE-2024-49969, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047, CVE-2024-50208

SuSE: SUSE-SU-2024:4131-1