SUSE SLES15 Security Update : kernel (SUSE-SU-2024:4313-1)

high Nessus Plugin ID 213020

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:4313-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070)
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1154353

https://bugzilla.suse.com/1198778

https://bugzilla.suse.com/1220927

https://www.suse.com/security/cve/CVE-2023-52524

https://bugzilla.suse.com/1231939

https://bugzilla.suse.com/1231940

https://bugzilla.suse.com/1231958

https://bugzilla.suse.com/1231962

https://bugzilla.suse.com/1231992

https://bugzilla.suse.com/1231995

https://bugzilla.suse.com/1232006

https://bugzilla.suse.com/1232163

https://bugzilla.suse.com/1232172

https://www.suse.com/security/cve/CVE-2022-48985

https://www.suse.com/security/cve/CVE-2022-49006

https://www.suse.com/security/cve/CVE-2022-49010

https://www.suse.com/security/cve/CVE-2022-49011

https://www.suse.com/security/cve/CVE-2022-49019

https://www.suse.com/security/cve/CVE-2022-49021

https://www.suse.com/security/cve/CVE-2022-49022

https://www.suse.com/security/cve/CVE-2022-49029

https://www.suse.com/security/cve/CVE-2022-49031

https://www.suse.com/security/cve/CVE-2022-49032

https://bugzilla.suse.com/1231991

https://bugzilla.suse.com/1232224

https://bugzilla.suse.com/1232436

https://bugzilla.suse.com/1233117

https://www.suse.com/security/cve/CVE-2024-49925

https://www.suse.com/security/cve/CVE-2024-50208

https://bugzilla.suse.com/1218644

https://bugzilla.suse.com/1232860

https://bugzilla.suse.com/1232907

https://bugzilla.suse.com/1232919

https://bugzilla.suse.com/1232928

https://bugzilla.suse.com/1233070

https://bugzilla.suse.com/1233293

https://bugzilla.suse.com/1233453

https://bugzilla.suse.com/1233456

https://bugzilla.suse.com/1233468

https://bugzilla.suse.com/1233479

https://bugzilla.suse.com/1233490

https://bugzilla.suse.com/1233491

https://bugzilla.suse.com/1233555

https://bugzilla.suse.com/1233557

http://www.nessus.org/u?b5be4dc1

https://www.suse.com/security/cve/CVE-2024-50089

https://www.suse.com/security/cve/CVE-2024-50115

https://www.suse.com/security/cve/CVE-2024-50125

https://www.suse.com/security/cve/CVE-2024-50127

https://www.suse.com/security/cve/CVE-2024-50154

https://www.suse.com/security/cve/CVE-2024-50205

https://www.suse.com/security/cve/CVE-2024-50264

https://www.suse.com/security/cve/CVE-2024-50267

https://www.suse.com/security/cve/CVE-2024-50279

https://www.suse.com/security/cve/CVE-2024-50290

https://www.suse.com/security/cve/CVE-2024-50301

https://www.suse.com/security/cve/CVE-2024-50302

https://www.suse.com/security/cve/CVE-2024-53061

https://www.suse.com/security/cve/CVE-2024-53063

Plugin Details

Severity: High

ID: 213020

File Name: suse_SU-2024-4313-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/14/2024

Updated: 12/14/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-53061

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_185-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/13/2024

Vulnerability Publication Date: 5/16/2023

Reference Information

CVE: CVE-2022-48985, CVE-2022-49006, CVE-2022-49010, CVE-2022-49011, CVE-2022-49019, CVE-2022-49021, CVE-2022-49022, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-52524, CVE-2024-49925, CVE-2024-50089, CVE-2024-50115, CVE-2024-50125, CVE-2024-50127, CVE-2024-50154, CVE-2024-50205, CVE-2024-50208, CVE-2024-50264, CVE-2024-50267, CVE-2024-50279, CVE-2024-50290, CVE-2024-50301, CVE-2024-50302, CVE-2024-53061, CVE-2024-53063

SuSE: SUSE-SU-2024:4313-1