Slackware Linux 15.0 kernel-generic Multiple Vulnerabilities (SSA:2023-325-01)

critical Nessus Plugin ID 186088

Synopsis

The remote Slackware Linux host is missing a security update to kernel-generic.

Description

The version of kernel-generic installed on the remote host is prior to 5.15.139 / 5.15.139_smp. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2023-325-01 advisory.

New kernel packages are available for Slackware 15.0 to fix security issues.

Tenable has extracted the preceding description block directly from the kernel-generic security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the affected kernel-generic package.

See Also

http://www.nessus.org/u?25fbf78b

Plugin Details

Severity: Critical

ID: 186088

File Name: Slackware_SSA_2023-325-01.nasl

Version: 1.6

Type: local

Published: 11/21/2023

Updated: 9/29/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 8.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C

CVSS Score Source: CVE-2023-38432

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:kernel-modules, p-cpe:/a:slackware:slackware_linux:kernel-generic, p-cpe:/a:slackware:slackware_linux:kernel-huge, p-cpe:/a:slackware:slackware_linux:kernel-huge-smp, p-cpe:/a:slackware:slackware_linux:kernel-modules-smp, p-cpe:/a:slackware:slackware_linux:kernel-headers, p-cpe:/a:slackware:slackware_linux:kernel-source, p-cpe:/a:slackware:slackware_linux:kernel-generic-smp, cpe:/o:slackware:slackware_linux:15.0

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/21/2023

Vulnerability Publication Date: 11/25/2022

Reference Information

CVE: CVE-2022-40982, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-48502, CVE-2023-1206, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-2124, CVE-2023-2898, CVE-2023-31085, CVE-2023-31248, CVE-2023-3212, CVE-2023-3338, CVE-2023-3390, CVE-2023-34324, CVE-2023-35001, CVE-2023-35788, CVE-2023-35827, CVE-2023-3609, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-3777, CVE-2023-38432, CVE-2023-3863, CVE-2023-3865, CVE-2023-3866, CVE-2023-39189, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4004, CVE-2023-4015, CVE-2023-40283, CVE-2023-4132, CVE-2023-4147, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-4244, CVE-2023-4273, CVE-2023-42752, CVE-2023-42753, CVE-2023-42754, CVE-2023-42755, CVE-2023-44466, CVE-2023-4569, CVE-2023-45871, CVE-2023-4623, CVE-2023-46813, CVE-2023-4921, CVE-2023-5158, CVE-2023-5178, CVE-2023-5197, CVE-2023-5717