SUSE SLES15 Security Update : kernel (SUSE-SU-2024:3408-1)

high Nessus Plugin ID 207728

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3408-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1229630

https://bugzilla.suse.com/1229631

https://bugzilla.suse.com/1229635

https://bugzilla.suse.com/1229636

https://bugzilla.suse.com/1229637

https://bugzilla.suse.com/1229638

https://bugzilla.suse.com/1229639

https://bugzilla.suse.com/1229641

https://bugzilla.suse.com/1229642

https://bugzilla.suse.com/1229643

https://bugzilla.suse.com/1229645

https://bugzilla.suse.com/1229657

https://bugzilla.suse.com/1229664

https://bugzilla.suse.com/1229707

https://bugzilla.suse.com/1229792

https://bugzilla.suse.com/1230245

https://bugzilla.suse.com/1230413

http://www.nessus.org/u?c61cc0db

https://www.suse.com/security/cve/CVE-2021-4441

https://www.suse.com/security/cve/CVE-2022-4382

https://www.suse.com/security/cve/CVE-2022-48868

https://www.suse.com/security/cve/CVE-2022-48869

https://www.suse.com/security/cve/CVE-2022-48870

https://www.suse.com/security/cve/CVE-2022-48871

https://www.suse.com/security/cve/CVE-2022-48872

https://www.suse.com/security/cve/CVE-2022-48873

https://www.suse.com/security/cve/CVE-2022-48875

https://www.suse.com/security/cve/CVE-2022-48878

https://www.suse.com/security/cve/CVE-2022-48880

https://www.suse.com/security/cve/CVE-2022-48890

https://www.suse.com/security/cve/CVE-2022-48891

https://www.suse.com/security/cve/CVE-2022-48896

https://www.suse.com/security/cve/CVE-2022-48898

https://www.suse.com/security/cve/CVE-2022-48899

https://www.suse.com/security/cve/CVE-2022-48903

https://www.suse.com/security/cve/CVE-2022-48904

https://www.suse.com/security/cve/CVE-2022-48905

https://www.suse.com/security/cve/CVE-2022-48907

https://www.suse.com/security/cve/CVE-2022-48909

https://www.suse.com/security/cve/CVE-2022-48912

https://www.suse.com/security/cve/CVE-2022-48913

https://www.suse.com/security/cve/CVE-2022-48914

https://www.suse.com/security/cve/CVE-2022-48915

https://www.suse.com/security/cve/CVE-2022-48916

https://www.suse.com/security/cve/CVE-2022-48917

https://www.suse.com/security/cve/CVE-2022-48918

https://www.suse.com/security/cve/CVE-2022-48919

https://www.suse.com/security/cve/CVE-2022-48921

https://www.suse.com/security/cve/CVE-2022-48924

https://www.suse.com/security/cve/CVE-2022-48925

https://www.suse.com/security/cve/CVE-2022-48926

https://www.suse.com/security/cve/CVE-2022-48927

https://www.suse.com/security/cve/CVE-2022-48928

https://www.suse.com/security/cve/CVE-2022-48929

https://www.suse.com/security/cve/CVE-2022-48930

https://www.suse.com/security/cve/CVE-2022-48931

https://www.suse.com/security/cve/CVE-2022-48932

https://www.suse.com/security/cve/CVE-2022-48934

https://www.suse.com/security/cve/CVE-2022-48935

https://www.suse.com/security/cve/CVE-2022-48937

https://www.suse.com/security/cve/CVE-2022-48938

https://www.suse.com/security/cve/CVE-2022-48941

https://www.suse.com/security/cve/CVE-2022-48942

https://www.suse.com/security/cve/CVE-2022-48943

https://www.suse.com/security/cve/CVE-2023-52489

https://www.suse.com/security/cve/CVE-2023-52893

https://www.suse.com/security/cve/CVE-2023-52894

https://www.suse.com/security/cve/CVE-2023-52896

https://www.suse.com/security/cve/CVE-2023-52898

https://www.suse.com/security/cve/CVE-2023-52900

https://www.suse.com/security/cve/CVE-2023-52901

https://www.suse.com/security/cve/CVE-2023-52905

https://www.suse.com/security/cve/CVE-2023-52907

https://www.suse.com/security/cve/CVE-2023-52911

https://www.suse.com/security/cve/CVE-2024-40910

https://www.suse.com/security/cve/CVE-2024-41009

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41062

https://www.suse.com/security/cve/CVE-2024-41087

https://www.suse.com/security/cve/CVE-2024-42077

https://www.suse.com/security/cve/CVE-2024-42126

https://www.suse.com/security/cve/CVE-2024-42230

https://www.suse.com/security/cve/CVE-2024-42232

https://www.suse.com/security/cve/CVE-2024-42271

https://www.suse.com/security/cve/CVE-2024-43853

https://www.suse.com/security/cve/CVE-2024-43861

https://www.suse.com/security/cve/CVE-2024-43882

https://www.suse.com/security/cve/CVE-2024-43883

https://www.suse.com/security/cve/CVE-2024-44938

https://www.suse.com/security/cve/CVE-2024-44947

https://www.suse.com/security/cve/CVE-2024-45003

https://bugzilla.suse.com/1193629

https://bugzilla.suse.com/1194111

https://bugzilla.suse.com/1194765

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1196261

https://bugzilla.suse.com/1196516

https://bugzilla.suse.com/1196894

https://bugzilla.suse.com/1198017

https://bugzilla.suse.com/1203360

https://bugzilla.suse.com/1206006

https://bugzilla.suse.com/1206258

https://bugzilla.suse.com/1207158

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1221326

https://bugzilla.suse.com/1221645

https://bugzilla.suse.com/1223191

https://bugzilla.suse.com/1224105

https://bugzilla.suse.com/1227832

https://bugzilla.suse.com/1228020

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228466

https://bugzilla.suse.com/1228489

https://bugzilla.suse.com/1228516

https://bugzilla.suse.com/1228576

https://bugzilla.suse.com/1228718

https://bugzilla.suse.com/1228801

https://bugzilla.suse.com/1228959

https://bugzilla.suse.com/1229042

https://bugzilla.suse.com/1229292

https://bugzilla.suse.com/1229400

https://bugzilla.suse.com/1229454

https://bugzilla.suse.com/1229500

https://bugzilla.suse.com/1229503

https://bugzilla.suse.com/1229506

https://bugzilla.suse.com/1229507

https://bugzilla.suse.com/1229508

https://bugzilla.suse.com/1229509

https://bugzilla.suse.com/1229510

https://bugzilla.suse.com/1229512

https://bugzilla.suse.com/1229516

https://bugzilla.suse.com/1229522

https://bugzilla.suse.com/1229526

https://bugzilla.suse.com/1229528

https://bugzilla.suse.com/1229531

https://bugzilla.suse.com/1229533

https://bugzilla.suse.com/1229535

https://bugzilla.suse.com/1229536

https://bugzilla.suse.com/1229537

https://bugzilla.suse.com/1229540

https://bugzilla.suse.com/1229544

https://bugzilla.suse.com/1229554

https://bugzilla.suse.com/1229557

https://bugzilla.suse.com/1229565

https://bugzilla.suse.com/1229566

https://bugzilla.suse.com/1229568

https://bugzilla.suse.com/1229581

https://bugzilla.suse.com/1229598

https://bugzilla.suse.com/1229603

https://bugzilla.suse.com/1229604

https://bugzilla.suse.com/1229608

https://bugzilla.suse.com/1229611

https://bugzilla.suse.com/1229612

https://bugzilla.suse.com/1229613

https://bugzilla.suse.com/1229614

https://bugzilla.suse.com/1229617

https://bugzilla.suse.com/1229619

https://bugzilla.suse.com/1229620

https://bugzilla.suse.com/1229622

https://bugzilla.suse.com/1229623

https://bugzilla.suse.com/1229624

https://bugzilla.suse.com/1229625

https://bugzilla.suse.com/1229626

https://bugzilla.suse.com/1229628

https://bugzilla.suse.com/1229629

Plugin Details

Severity: High

ID: 207728

File Name: suse_SU-2024-3408-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/25/2024

Updated: 9/25/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-42271

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_133-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2024

Vulnerability Publication Date: 4/4/2022

Reference Information

CVE: CVE-2021-4441, CVE-2022-4382, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41011, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42230, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947, CVE-2024-45003

SuSE: SUSE-SU-2024:3408-1