SUSE SLES15 Security Update : kernel (SUSE-SU-2024:4140-1)

high Nessus Plugin ID 212547

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:4140-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47589: igbvf: fix double free in `igbvf_probe` (bsc#1226557).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays (bsc#1232304).
- CVE-2022-48988: memcg: Fix possible use-after-free in memcg_write_event_control() (bsc#1232069).
- CVE-2022-48991: khugepaged: retract_page_tables() remember to test exit (bsc#1232070 prerequisity).
- CVE-2022-49003: nvme: fix SRCU protection of nvme_ns_head list (bsc#1232136).
- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49023: wifi: cfg80211: fix buffer overflow in elem comparison (bsc#1231961).
- CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1231960).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1195775

https://bugzilla.suse.com/1204171

https://www.suse.com/security/cve/CVE-2022-3435

https://www.suse.com/security/cve/CVE-2022-45934

https://bugzilla.suse.com/1205796

https://bugzilla.suse.com/1206344

https://bugzilla.suse.com/1209290

https://www.suse.com/security/cve/CVE-2023-28327

https://bugzilla.suse.com/1218562

https://www.suse.com/security/cve/CVE-2023-6270

https://bugzilla.suse.com/1216223

https://www.suse.com/security/cve/CVE-2023-46343

https://bugzilla.suse.com/1223824

https://www.suse.com/security/cve/CVE-2024-27043

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1225189

https://bugzilla.suse.com/1225336

https://www.suse.com/security/cve/CVE-2021-47416

https://bugzilla.suse.com/1225611

https://bugzilla.suse.com/1226211

https://bugzilla.suse.com/1226212

https://bugzilla.suse.com/1226557

https://www.suse.com/security/cve/CVE-2021-47589

https://www.suse.com/security/cve/CVE-2023-52881

https://bugzilla.suse.com/1228743

https://www.suse.com/security/cve/CVE-2024-42145

https://bugzilla.suse.com/1229042

https://bugzilla.suse.com/1229454

https://www.suse.com/security/cve/CVE-2024-44947

https://bugzilla.suse.com/1229456

https://bugzilla.suse.com/1230454

https://www.suse.com/security/cve/CVE-2024-45026

https://bugzilla.suse.com/1223524

https://bugzilla.suse.com/1230429

https://bugzilla.suse.com/1231073

https://bugzilla.suse.com/1231191

https://bugzilla.suse.com/1231193

https://bugzilla.suse.com/1231197

https://bugzilla.suse.com/1231200

https://bugzilla.suse.com/1231203

https://bugzilla.suse.com/1231293

https://bugzilla.suse.com/1231375

https://bugzilla.suse.com/1231502

https://bugzilla.suse.com/1231673

https://bugzilla.suse.com/1231861

https://bugzilla.suse.com/1231887

https://bugzilla.suse.com/1231890

https://bugzilla.suse.com/1231893

https://bugzilla.suse.com/1231895

https://bugzilla.suse.com/1231936

https://bugzilla.suse.com/1231938

https://bugzilla.suse.com/1231942

https://bugzilla.suse.com/1231960

https://bugzilla.suse.com/1231961

https://bugzilla.suse.com/1231979

https://bugzilla.suse.com/1231987

https://bugzilla.suse.com/1231988

https://bugzilla.suse.com/1232033

https://bugzilla.suse.com/1232069

https://bugzilla.suse.com/1232070

https://bugzilla.suse.com/1232097

https://bugzilla.suse.com/1232136

https://bugzilla.suse.com/1232145

https://bugzilla.suse.com/1232262

https://bugzilla.suse.com/1232282

https://bugzilla.suse.com/1232286

https://bugzilla.suse.com/1232304

https://bugzilla.suse.com/1232383

https://bugzilla.suse.com/1232418

https://bugzilla.suse.com/1232424

https://bugzilla.suse.com/1232432

https://bugzilla.suse.com/1232519

https://www.suse.com/security/cve/CVE-2022-48664

https://www.suse.com/security/cve/CVE-2022-48947

https://www.suse.com/security/cve/CVE-2022-48956

https://www.suse.com/security/cve/CVE-2022-48960

https://www.suse.com/security/cve/CVE-2022-48962

https://www.suse.com/security/cve/CVE-2022-48967

https://www.suse.com/security/cve/CVE-2022-48970

https://www.suse.com/security/cve/CVE-2022-48988

https://www.suse.com/security/cve/CVE-2022-48991

https://www.suse.com/security/cve/CVE-2022-48999

https://www.suse.com/security/cve/CVE-2022-49003

https://www.suse.com/security/cve/CVE-2022-49014

https://www.suse.com/security/cve/CVE-2022-49015

https://www.suse.com/security/cve/CVE-2022-49023

https://www.suse.com/security/cve/CVE-2022-49025

https://www.suse.com/security/cve/CVE-2023-52919

https://www.suse.com/security/cve/CVE-2024-45016

https://www.suse.com/security/cve/CVE-2024-46813

https://www.suse.com/security/cve/CVE-2024-46814

https://www.suse.com/security/cve/CVE-2024-46816

https://www.suse.com/security/cve/CVE-2024-46817

https://www.suse.com/security/cve/CVE-2024-46818

https://www.suse.com/security/cve/CVE-2024-46849

https://www.suse.com/security/cve/CVE-2024-47668

https://www.suse.com/security/cve/CVE-2024-47674

https://www.suse.com/security/cve/CVE-2024-47684

https://www.suse.com/security/cve/CVE-2024-47706

https://www.suse.com/security/cve/CVE-2024-47747

https://www.suse.com/security/cve/CVE-2024-49860

https://www.suse.com/security/cve/CVE-2024-49867

https://www.suse.com/security/cve/CVE-2024-49936

https://www.suse.com/security/cve/CVE-2024-49969

https://www.suse.com/security/cve/CVE-2024-49974

https://www.suse.com/security/cve/CVE-2024-49982

https://www.suse.com/security/cve/CVE-2024-49991

https://www.suse.com/security/cve/CVE-2024-49995

https://www.suse.com/security/cve/CVE-2024-50047

https://bugzilla.suse.com/1219125

https://bugzilla.suse.com/1232280

http://www.nessus.org/u?e8e85e03

Plugin Details

Severity: High

ID: 212547

File Name: suse_SU-2024-4140-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/12/2024

Updated: 12/12/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-50047

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_182-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/2/2024

Vulnerability Publication Date: 1/26/2022

Reference Information

CVE: CVE-2021-47416, CVE-2021-47589, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962, CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999, CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025, CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-45026, CVE-2024-46813, CVE-2024-46814, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49969, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047

SuSE: SUSE-SU-2024:4140-1