SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1) - Nessus
High Plugin ID: 150536This page contains detailed information about the SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1) Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.
Plugin Overview
ID: 150536
Name: SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1)
Filename: suse_SU-2021-14630-1.nasl
Vulnerability Published: 2019-09-24
This Plugin Published: 2021-06-10
Last Modification Time: 2022-01-21
Plugin Version: 1.3
Plugin Type: local
Plugin Family: SuSE Local Security Checks
Dependencies:
linux_alt_patch_detect.nasl, ssh_get_info.nasl
Required KB Items [?]: Host/cpu, Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list
Vulnerability Information
Severity: High
Vulnerability Published: 2019-09-24
Patch Published: 2021-02-16
CVE [?]: CVE-2019-16746, CVE-2020-0404, CVE-2020-0431, CVE-2020-0465, CVE-2020-4788, CVE-2020-11668, CVE-2020-14331, CVE-2020-14353, CVE-2020-14381, CVE-2020-14390, CVE-2020-15436, CVE-2020-15437, CVE-2020-25211, CVE-2020-25284, CVE-2020-25285, CVE-2020-25643, CVE-2020-25656, CVE-2020-25668, CVE-2020-25669, CVE-2020-27068, CVE-2020-27777, CVE-2020-27786, CVE-2020-28915, CVE-2020-28974, CVE-2020-29660, CVE-2020-29661, CVE-2020-36158, CVE-2021-3347
CPE [?]: cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-bigmem, p-cpe:/a:novell:suse_linux:kernel-bigmem-base, p-cpe:/a:novell:suse_linux:kernel-bigmem-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-ppc64, p-cpe:/a:novell:suse_linux:kernel-ppc64-base, p-cpe:/a:novell:suse_linux:kernel-ppc64-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-trace-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel
Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:14630-1 advisory.
- An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)
- In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel (CVE-2020-0404)
- In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459 (CVE-2020-0431)
- In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel (CVE-2020-0465)
- In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770. (CVE-2020-11668)
- A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)
- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. (CVE-2020-14353)
- A flaw was found in the Linux kernels futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-14381)
- A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of- bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2020-14390)
- Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field. (CVE-2020-15436)
- The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized. (CVE-2020-15437)
- In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff. (CVE-2020-25211)
- The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)
- A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812. (CVE-2020-25285)
- A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-25643)
- A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality. (CVE-2020-25656)
- A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op. (CVE-2020-25668)
- A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. (CVE-2020-25669)
- In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583 (CVE-2020-27068)
- A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel. (CVE-2020-27777)
- A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-27786)
- A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def. (CVE-2020-28915)
- A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height. (CVE-2020-28974)
- A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24. (CVE-2020-29660)
- A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b. (CVE-2020-29661)
- mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332. (CVE-2020-36158)
- IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296. (CVE-2020-4788)
- An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458. (CVE-2021-3347)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Public Exploits
Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits are available
Here's the list of publicly known exploits and PoCs for verifying the SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1) vulnerability:
- GitHub: https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381
[CVE-2020-14381] - GitHub: https://github.com/xairy/linux-kernel-exploitation
[CVE-2020-14381] - GitHub: https://github.com/ZIllR0/Routers
[CVE-2020-14390] - GitHub: https://github.com/artsking/linux-3.0.35_CVE-2020-15436_withPatch
[CVE-2020-15436] - GitHub: https://github.com/artsking/linux-4.1.15_CVE-2020-15436_withPatch
[CVE-2020-15436] - GitHub: https://github.com/EGI-Federation/SVG-advisories
[CVE-2020-25211] - GitHub: https://github.com/DNTYO/F5_Vulnerability
[CVE-2020-25643] - GitHub: https://github.com/ZIllR0/Routers
[CVE-2020-28974] - GitHub: https://github.com/nanopathi/linux-4.19.72_CVE-2021-3347
[CVE-2021-3347]
Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.
WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.
Risk Information
CVSS Score Source [?]: CVE-2020-25643
CVSS V2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:C/E:POC/RL:OF/RC:C
CVSS Base Score: | 7.5 (High) |
Impact Subscore: | 8.5 |
Exploitability Subscore: | 6.8 |
CVSS Temporal Score: | 5.9 (Medium) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 5.9 (Medium) |
CVSS Base Score: | 7.2 (High) |
Impact Subscore: | 5.9 |
Exploitability Subscore: | 1.2 |
CVSS Temporal Score: | 6.5 (Medium) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 6.5 (Medium) |
Go back to menu.
Plugin Source
This is the suse_SU-2021-14630-1.nasl nessus plugin source code. This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2021:14630-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(150536);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/01/21");
script_cve_id(
"CVE-2019-16746",
"CVE-2020-0404",
"CVE-2020-0431",
"CVE-2020-0465",
"CVE-2020-4788",
"CVE-2020-11668",
"CVE-2020-14331",
"CVE-2020-14353",
"CVE-2020-14381",
"CVE-2020-14390",
"CVE-2020-15436",
"CVE-2020-15437",
"CVE-2020-25211",
"CVE-2020-25284",
"CVE-2020-25285",
"CVE-2020-25643",
"CVE-2020-25656",
"CVE-2020-25668",
"CVE-2020-25669",
"CVE-2020-27068",
"CVE-2020-27777",
"CVE-2020-27786",
"CVE-2020-28915",
"CVE-2020-28974",
"CVE-2020-29660",
"CVE-2020-29661",
"CVE-2020-36158",
"CVE-2021-3347"
);
script_xref(name:"SuSE", value:"SUSE-SU-2021:14630-1");
script_name(english:"SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in
the SUSE-SU-2021:14630-1 advisory.
- An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check
the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)
- In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual
root cause. This could lead to local escalation of privilege in the kernel with no additional execution
privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android
kernelAndroid ID: A-111893654References: Upstream kernel (CVE-2020-0404)
- In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This
could lead to local escalation of privilege with no additional execution privileges needed. User
interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
(CVE-2020-0431)
- In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds
check. This could lead to local escalation of privilege with no additional execution privileges needed.
User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:
A-162844689References: Upstream kernel (CVE-2020-0465)
- In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB
driver) mishandles invalid descriptors, aka CID-a246b4d54770. (CVE-2020-11668)
- A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a
local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds
write to occur. This flaw allows a local user with access to the VGA console to crash the system,
potentially escalating their privileges on the system. The highest threat from this vulnerability is to
data confidentiality and integrity as well as system availability. (CVE-2020-14331)
- ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a
duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this
candidate. All references and descriptions in this candidate have been removed to prevent accidental
usage. (CVE-2020-14353)
- A flaw was found in the Linux kernels futex implementation. This flaw allows a local attacker to corrupt
system memory or escalate their privileges when creating a futex on a filesystem that is about to be
unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system
availability. (CVE-2020-14381)
- A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-
bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of
the flaw, privilege escalation cannot be fully ruled out. (CVE-2020-14390)
- Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain
privileges or cause a denial of service by leveraging improper access to a certain error field.
(CVE-2020-15436)
- The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in
drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial
of service by using the p->serial_in pointer which uninitialized. (CVE-2020-15437)
- In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could
overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in
ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
(CVE-2020-25211)
- The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete
permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap
rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)
- A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be
used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified
other impact, aka CID-17743798d812. (CVE-2020-25285)
- A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption
and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause
the system to crash or cause a denial of service. The highest threat from this vulnerability is to data
confidentiality and integrity as well as system availability. (CVE-2020-25643)
- A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was
using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of
bounds. The highest threat from this vulnerability is to data confidentiality. (CVE-2020-25656)
- A flaw was found in Linux Kernel because access to the global variable fg_console is not properly
synchronized leading to a use after free in con_font_op. (CVE-2020-25668)
- A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by
sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in
sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. (CVE-2020-25669)
- In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds
check. This could lead to local information disclosure with System execution privileges needed. User
interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID:
A-119770583 (CVE-2020-27068)
- A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked
down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries
platform) a root like local user could use this flaw to further increase their privileges to that of a
running kernel. (CVE-2020-27777)
- A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and
the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to
this specific memory while freed and before use causes the flow of execution to change and possibly allow
for memory corruption or privilege escalation. The highest threat from this vulnerability is to
confidentiality, integrity, as well as system availability. (CVE-2020-27786)
- A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be
used by local attackers to read kernel memory, aka CID-6735b4632def. (CVE-2020-28915)
- A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to
read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because
KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height. (CVE-2020-28974)
- A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.
drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID,
aka CID-c8bcd9c5be24. (CVE-2020-29660)
- A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13.
drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
(CVE-2020-29661)
- mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through
5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
(CVE-2020-36158)
- IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive
information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
(CVE-2020-4788)
- An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free
during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
(CVE-2021-3347)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1152107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1168952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1173659");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1173942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174205");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1175691");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176011");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176012");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176235");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176253");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176278");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176395");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176423");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176485");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1176896");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177206");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177766");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177906");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178123");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178182");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178590");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178622");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1178886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179141");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179419");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179616");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179877");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180029");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180030");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180052");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180086");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1180562");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1181158");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1181166");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1181349");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1181553");
# https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?56f42edd");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16746");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-0404");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-0431");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-0465");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-11668");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-14331");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-14353");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-14381");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-14390");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15436");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-15437");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25211");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25284");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25285");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25643");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25656");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25668");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-25669");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-27068");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-27777");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-27786");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-28915");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-28974");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-29660");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-29661");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-36158");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-4788");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-3347");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-25643");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/24");
script_set_attribute(attribute:"patch_publication_date", value:"2021/02/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/06/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-bigmem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-bigmem-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-bigmem-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ec2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ec2-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ec2-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-pae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-pae-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-pae-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ppc64");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ppc64-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-ppc64-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-trace");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-trace-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-trace-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('audit.inc');
include('global_settings.inc');
include('misc_func.inc');
include('rpm.inc');
include('ksplice.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES11)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES11', 'SUSE ' + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES11" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES11 SP4", os_ver + " SP" + sp);
pkgs = [
{'reference':'kernel-default-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-default-base-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-default-devel-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-default-man-3.0.101-108.120', 'sp':'4', 'cpu':'s390x', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-base-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-ec2-devel-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-pae-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-pae-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-pae-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-source-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-syms-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-trace-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-trace-base-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-trace-devel-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-base-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-xen-devel-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-11.4'},
{'reference':'kernel-default-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-default-base-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-default-devel-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-default-man-3.0.101-108.120', 'sp':'4', 'cpu':'s390x', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-base-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-ec2-devel-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-pae-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-pae-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-pae-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-source-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-syms-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-trace-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-trace-base-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-trace-devel-3.0.101-108.120', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-base-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-base-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-devel-3.0.101-108.120', 'sp':'4', 'cpu':'i586', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},
{'reference':'kernel-xen-devel-3.0.101-108.120', 'sp':'4', 'cpu':'x86_64', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'}
];
flag = 0;
foreach package_array ( pkgs ) {
reference = NULL;
release = NULL;
sp = NULL;
cpu = NULL;
exists_check = NULL;
rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && release && exists_check) {
if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
else if (reference && release) {
if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
ltss_plugin_caveat = '\n' +
'NOTE: This vulnerability check contains fixes that apply to\n' +
'packages only available in SUSE Enterprise Linux Server LTSS\n' +
'repositories. Access to these package security updates require\n' +
'a paid SUSE LTSS subscription.\n';
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + ltss_plugin_caveat
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-default / kernel-default-base / kernel-default-devel / etc');
}
The latest version of this script can be found in these locations depending on your platform:
- Linux / Unix:
/opt/nessus/lib/nessus/plugins/suse_SU-2021-14630-1.nasl
- Windows:
C:\ProgramData\Tenable\Nessus\nessus\plugins\suse_SU-2021-14630-1.nasl
- Mac OS X:
/Library/Nessus/run/lib/nessus/plugins/suse_SU-2021-14630-1.nasl
Go back to menu.
How to Run
Here is how to run the SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1) as a standalone plugin via the Nessus web user interface (https://localhost:8834/):
- Click to start a New Scan.
- Select Advanced Scan.
- Navigate to the Plugins tab.
- On the top right corner click to Disable All plugins.
- On the left side table select SuSE Local Security Checks plugin family.
- On the right side table select SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14630-1) plugin ID 150536.
- Specify the target on the Settings tab and click to Save the scan.
- Run the scan.
Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.
Basic usage:
/opt/nessus/bin/nasl suse_SU-2021-14630-1.nasl -t <IP/HOST>
Run the plugin with audit trail message on the console:
/opt/nessus/bin/nasl -a suse_SU-2021-14630-1.nasl -t <IP/HOST>
Run the plugin with trace script execution written to the console (useful for debugging):
/opt/nessus/bin/nasl -T - suse_SU-2021-14630-1.nasl -t <IP/HOST>
Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):
/opt/nessus/bin/nasl -K /tmp/state suse_SU-2021-14630-1.nasl -t <IP/HOST>
Go back to menu.
References
SuSE Security Advisory:
- SUSE-SU-2021:14630-1
- https://www.tenable.com/plugins/nessus/150536
- https://bugzilla.suse.com/1152107
- https://bugzilla.suse.com/1168952
- https://bugzilla.suse.com/1173659
- https://bugzilla.suse.com/1173942
- https://bugzilla.suse.com/1174205
- https://bugzilla.suse.com/1174247
- https://bugzilla.suse.com/1174993
- https://bugzilla.suse.com/1175691
- https://bugzilla.suse.com/1176011
- https://bugzilla.suse.com/1176012
- https://bugzilla.suse.com/1176235
- https://bugzilla.suse.com/1176253
- https://bugzilla.suse.com/1176278
- https://bugzilla.suse.com/1176395
- https://bugzilla.suse.com/1176423
- https://bugzilla.suse.com/1176482
- https://bugzilla.suse.com/1176485
- https://bugzilla.suse.com/1176722
- https://bugzilla.suse.com/1176896
- https://bugzilla.suse.com/1177206
- https://bugzilla.suse.com/1177226
- https://bugzilla.suse.com/1177666
- https://bugzilla.suse.com/1177766
- https://bugzilla.suse.com/1177906
- https://bugzilla.suse.com/1178123
- https://bugzilla.suse.com/1178182
- https://bugzilla.suse.com/1178589
- https://bugzilla.suse.com/1178590
- https://bugzilla.suse.com/1178622
- https://bugzilla.suse.com/1178886
- https://bugzilla.suse.com/1179107
- https://bugzilla.suse.com/1179140
- https://bugzilla.suse.com/1179141
- https://bugzilla.suse.com/1179419
- https://bugzilla.suse.com/1179601
- https://bugzilla.suse.com/1179616
- https://bugzilla.suse.com/1179745
- https://bugzilla.suse.com/1179877
- https://bugzilla.suse.com/1180029
- https://bugzilla.suse.com/1180030
- https://bugzilla.suse.com/1180052
- https://bugzilla.suse.com/1180086
- https://bugzilla.suse.com/1180559
- https://bugzilla.suse.com/1180562
- https://bugzilla.suse.com/1181158
- https://bugzilla.suse.com/1181166
- https://bugzilla.suse.com/1181349
- https://bugzilla.suse.com/1181553
- https://www.suse.com/security/cve/CVE-2019-16746
- https://www.suse.com/security/cve/CVE-2020-0404
- https://www.suse.com/security/cve/CVE-2020-0431
- https://www.suse.com/security/cve/CVE-2020-0465
- https://www.suse.com/security/cve/CVE-2020-4788
- https://www.suse.com/security/cve/CVE-2020-11668
- https://www.suse.com/security/cve/CVE-2020-14331
- https://www.suse.com/security/cve/CVE-2020-14353
- https://www.suse.com/security/cve/CVE-2020-14381
- https://www.suse.com/security/cve/CVE-2020-14390
- https://www.suse.com/security/cve/CVE-2020-15436
- https://www.suse.com/security/cve/CVE-2020-15437
- https://www.suse.com/security/cve/CVE-2020-25211
- https://www.suse.com/security/cve/CVE-2020-25284
- https://www.suse.com/security/cve/CVE-2020-25285
- https://www.suse.com/security/cve/CVE-2020-25643
- https://www.suse.com/security/cve/CVE-2020-25656
- https://www.suse.com/security/cve/CVE-2020-25668
- https://www.suse.com/security/cve/CVE-2020-25669
- https://www.suse.com/security/cve/CVE-2020-27068
- https://www.suse.com/security/cve/CVE-2020-27777
- https://www.suse.com/security/cve/CVE-2020-27786
- https://www.suse.com/security/cve/CVE-2020-28915
- https://www.suse.com/security/cve/CVE-2020-28974
- https://www.suse.com/security/cve/CVE-2020-29660
- https://www.suse.com/security/cve/CVE-2020-29661
- https://www.suse.com/security/cve/CVE-2020-36158
- https://www.suse.com/security/cve/CVE-2021-3347
- http://www.nessus.org/u?56f42edd
- https://vulners.com/nessus/SUSE_SU-2021-14630-1.NASL
- 149444 - RHEL 7 : kernel (RHSA-2021:1531)
- 149587 - EulerOS 2.0 SP5 : kernel (EulerOS-SA-2021-1904)
- 149607 - EulerOS 2.0 SP8 : kernel (EulerOS-SA-2021-1879)
- 149660 - RHEL 8 : kernel-rt (RHSA-2021:1739)
- 149670 - RHEL 8 : kernel (RHSA-2021:1578)
- 149874 - CentOS 8 : kernel (CESA-2021:1578)
- 149898 - RHEL 8 : kpatch-patch (RHSA-2021:2099)
- 149904 - RHEL 8 : kernel (RHSA-2021:2106)
- 149914 - Oracle Linux 8 : kernel (ELSA-2021-1578)
- 150117 - RHEL 7 : kernel (RHSA-2021:2164)
- 150213 - EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-1950)
- 150214 - EulerOS 2.0 SP9 : kernel (EulerOS-SA-2021-1929)
- 150347 - RHEL 7 : kpatch-patch (RHSA-2021:2285)
- 150379 - RHEL 7 : kernel (RHSA-2021:2314)
- 150380 - RHEL 7 : kernel-rt (RHSA-2021:2316)
- 150422 - RHEL 7 : kernel (RHSA-2021:2355)
- 150447 - Oracle Linux 7 : kernel (ELSA-2021-2314)
- 150770 - CentOS 7 : kernel (CESA-2021:2314)
- 150782 - Oracle Linux 7 : Unbreakable Enterprise kernel-container (ELSA-2021-9308)
- 150784 - Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2021-9305)
- 150800 - Scientific Linux Security Update : kernel on SL7.x x86_64 (2021:2314)
- 150963 - RHEL 7 : kernel (RHSA-2021:2523)
- 151167 - EulerOS Virtualization for ARM 64 3.0.6.0 : kernel (EulerOS-SA-2021-2002)
- 151229 - EulerOS Virtualization 3.0.6.6 : kernel (EulerOS-SA-2021-2040)
- 151307 - EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2021-2075)
- 151419 - EulerOS Virtualization 3.0.2.2 : kernel (EulerOS-SA-2021-2140)
- 151842 - RHEL 7 : kernel (RHSA-2021:2733)
- 151843 - RHEL 7 : kpatch-patch (RHSA-2021:2731)
- 151858 - RHEL 7 : kernel (RHSA-2021:2732)
- 151867 - RHEL 7 : kernel (RHSA-2021:2730)
- 151886 - RHEL 7 : kernel-rt (RHSA-2021:2726)
- 151888 - RHEL 7 : kernel (RHSA-2021:2725)
- 151926 - Oracle Linux 7 : kernel (ELSA-2021-2725)
- 151979 - CentOS 7 : kernel (CESA-2021:2725)
Version
This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file suse_SU-2021-14630-1.nasl version 1.3. For more plugins, visit the Nessus Plugin Library.
Go back to menu.