SUSE SLES15 Security Update : kernel (SUSE-SU-2024:4346-1)

high Nessus Plugin ID 213121

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:4346-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1218644

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1221309

https://bugzilla.suse.com/1222590

https://bugzilla.suse.com/1229808

https://bugzilla.suse.com/1230220

https://bugzilla.suse.com/1231646

https://bugzilla.suse.com/1232187

https://bugzilla.suse.com/1232312

https://bugzilla.suse.com/1232860

https://bugzilla.suse.com/1232907

https://bugzilla.suse.com/1232919

https://bugzilla.suse.com/1232928

https://bugzilla.suse.com/1233070

https://bugzilla.suse.com/1233214

https://bugzilla.suse.com/1233293

https://bugzilla.suse.com/1233453

https://bugzilla.suse.com/1233456

https://bugzilla.suse.com/1233463

https://bugzilla.suse.com/1233468

https://bugzilla.suse.com/1233479

https://bugzilla.suse.com/1233490

https://bugzilla.suse.com/1233491

https://bugzilla.suse.com/1233555

https://bugzilla.suse.com/1233557

https://bugzilla.suse.com/1233561

https://bugzilla.suse.com/1233977

http://www.nessus.org/u?b2528f12

https://www.suse.com/security/cve/CVE-2023-52922

https://www.suse.com/security/cve/CVE-2024-26782

https://www.suse.com/security/cve/CVE-2024-44932

https://www.suse.com/security/cve/CVE-2024-44964

https://www.suse.com/security/cve/CVE-2024-47757

https://www.suse.com/security/cve/CVE-2024-50017

https://www.suse.com/security/cve/CVE-2024-50089

https://www.suse.com/security/cve/CVE-2024-50115

https://www.suse.com/security/cve/CVE-2024-50125

https://www.suse.com/security/cve/CVE-2024-50127

https://www.suse.com/security/cve/CVE-2024-50154

https://www.suse.com/security/cve/CVE-2024-50205

https://www.suse.com/security/cve/CVE-2024-50259

https://www.suse.com/security/cve/CVE-2024-50264

https://www.suse.com/security/cve/CVE-2024-50267

https://www.suse.com/security/cve/CVE-2024-50274

https://www.suse.com/security/cve/CVE-2024-50279

https://www.suse.com/security/cve/CVE-2024-50290

https://www.suse.com/security/cve/CVE-2024-50301

https://www.suse.com/security/cve/CVE-2024-50302

https://www.suse.com/security/cve/CVE-2024-53061

https://www.suse.com/security/cve/CVE-2024-53063

https://www.suse.com/security/cve/CVE-2024-53068

Plugin Details

Severity: High

ID: 213121

File Name: suse_SU-2024-4346-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/18/2024

Updated: 12/18/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-53068

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_144-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/17/2024

Vulnerability Publication Date: 3/27/2024

Reference Information

CVE: CVE-2023-52922, CVE-2024-26782, CVE-2024-44932, CVE-2024-44964, CVE-2024-47757, CVE-2024-50017, CVE-2024-50089, CVE-2024-50115, CVE-2024-50125, CVE-2024-50127, CVE-2024-50154, CVE-2024-50205, CVE-2024-50259, CVE-2024-50264, CVE-2024-50267, CVE-2024-50274, CVE-2024-50279, CVE-2024-50290, CVE-2024-50301, CVE-2024-50302, CVE-2024-53061, CVE-2024-53063, CVE-2024-53068

SuSE: SUSE-SU-2024:4346-1