RSA-2024-06: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities
2 years ago
RSA-2024-06: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities

RSA Identifier: RSA-2024-06

CVE Identifier: See Advisory

Severity: Critical

Severity Rating: See NVD (http://nvd.nist.gov/home.cfm) for individual scores for each CVE

Affected products (all versions): 
  • RSA Governance and Lifecycle (Virtual Application deployments only)
  • SecurID Governance and Lifecycle (Hardware Appliance and Virtual Application deployments only)

Note: The latest patches affect the Hardware Appliance and Virtual Application deployments with an RSA-supplied SUSE Linux Enterprise Server 12 SP5 and SUSE Linux Enterprise Server 15 SP5 operating system.  For those customers currently using SUSE Linux Enterprise Server 15 SP4, the updater will update you to SUSE Linux Enterprise Server 15 SP5 with all the latest patches.

Unaffected Products:
  • RSA Governance and Lifecycle and SecurID Governance and Lifecycle:
    Software-only systems or any deployment where RSA did not supply the operating system.

Summary:
The embedded operating system components in RSA Governance and Lifecycle and SecurID Governance and Lifecycle require a security update to address various vulnerabilities.

Details:
RSA Governance and Lifecycle and SecurID Governance and Lifecycle have been updated to address the following security vulnerabilities.  

SUSE Linux Enterprise Server 12 SP5 OS Updates 

 
CVE-2014-1745CVE-2015-8668CVE-2017-5849CVE-2019-14889CVE-2019-25162
CVE-2020-1730CVE-2020-16135CVE-2020-36773CVE-2020-36777CVE-2020-36784
CVE-2021-3634CVE-2021-33200CVE-2021-33631CVE-2021-46906CVE-2021-46915
CVE-2021-46921CVE-2021-46924CVE-2021-46929CVE-2021-46932CVE-2021-46953
CVE-2021-46974CVE-2021-46991CVE-2021-46992CVE-2021-47013CVE-2021-47054
CVE-2021-47076CVE-2021-47077CVE-2021-47078CVE-2022-20154CVE-2022-48624
CVE-2022-48627CVE-2023-1667CVE-2023-2283CVE-2023-4750CVE-2023-5388
CVE-2023-5388CVE-2023-6004CVE-2023-6040CVE-2023-6356CVE-2023-6535
CVE-2023-6536CVE-2023-6597CVE-2023-6610CVE-2023-6918CVE-2023-7207
CVE-2023-22655CVE-2023-27043CVE-2023-27043CVE-2023-27043CVE-2023-28746
CVE-2023-28746CVE-2023-35827CVE-2023-38288CVE-2023-38469CVE-2023-38470
CVE-2023-38471CVE-2023-38472CVE-2023-38575CVE-2023-39368CVE-2023-40217
CVE-2023-40414CVE-2023-40745CVE-2023-41175CVE-2023-42465CVE-2023-42833
CVE-2023-42843CVE-2023-42950CVE-2023-42956CVE-2023-43490CVE-2023-44446
CVE-2023-46343CVE-2023-46838CVE-2023-47233CVE-2023-48231CVE-2023-48232
CVE-2023-48233CVE-2023-48234CVE-2023-48235CVE-2023-48236CVE-2023-48237
CVE-2023-48706CVE-2023-48795CVE-2023-51042CVE-2023-51043CVE-2023-51385
CVE-2023-51764CVE-2023-51780CVE-2023-51782CVE-2023-52340CVE-2023-52356
CVE-2023-52429CVE-2023-52443CVE-2023-52445CVE-2023-52449CVE-2023-52451
CVE-2023-52464CVE-2023-52475CVE-2023-52478CVE-2023-52482CVE-2023-52502
CVE-2023-52530CVE-2023-52531CVE-2023-52532CVE-2023-52574CVE-2023-52597
CVE-2023-52605CVE-2024-0217CVE-2024-0340CVE-2024-0607CVE-2024-0727
CVE-2024-0727CVE-2024-0743CVE-2024-0775CVE-2024-1086CVE-2024-1151
CVE-2024-1546CVE-2024-1547CVE-2024-1548CVE-2024-1549CVE-2024-1550
CVE-2024-1551CVE-2024-1552CVE-2024-1553CVE-2024-2004CVE-2024-2398
CVE-2024-2605CVE-2024-2607CVE-2024-2608CVE-2024-2609CVE-2024-2610
CVE-2024-2611CVE-2024-2612CVE-2024-2614CVE-2024-2616CVE-2024-3302
CVE-2024-3651CVE-2024-3852CVE-2024-3854CVE-2024-3857CVE-2024-3859
CVE-2024-3861CVE-2024-3863CVE-2024-3864CVE-2024-22667CVE-2024-23206
CVE-2024-23213CVE-2024-23222CVE-2024-23252CVE-2024-23254CVE-2024-23263
CVE-2024-23280CVE-2024-23284CVE-2024-23849CVE-2024-23851CVE-2024-25062
CVE-2024-26458CVE-2024-26461CVE-2024-26585CVE-2024-26595CVE-2024-26600
CVE-2024-26622CVE-2024-28085CVE-2024-28182CVE-2024-29944CVE-2024-31080
CVE-2024-31081CVE-2024-31082CVE-2024-31083CVE-2024-31083CVE-2024-31744

SUSE Linux Enterprise Server 15 SP4 OS Updates
 
 CVE-2024-2004CVE-2024-2398

Note: For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm.  To search for a CVE, use the database's search utility at http://web.nvd.nist.gov/view/vuln/search.

Recommendation:
The Appliance Updater tool's May 2024 release will resolve these issues and ensure that the embedded OS components are kept current with security updates and patches

RSA recommends all appliance customers who are on SUSE Linux Enterprise Server 12 SP5 and SUSE Linux Enterprise Server 15 SP4 to run the appliance updater as the latest patches will be applied to the current installation.

This Appliance Updater supports the RSA Governance and Lifecycle or SecurID Governance and Lifecycle products which use an RSA-supplied SUSE Linux Enterprise Server 12 SP4 and SUSE Linux Enterprise Server 15 SP4 operating system.

Customers can download the Appliance Updater from here. The product documentation and software are available on the RSA Governance and Lifecycle space of RSA Community.

Severity Rating:
For an explanation of Severity Ratings, refer to the Security Advisories Severity Rating knowledge base article. RSA recommends all customers consider both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with security vulnerability.

Legal Information:
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact RSA Technical Support. RSA Security LLC and its affiliates, including without limitation, distribute RSA Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title, and non-infringement. In no event shall RSA, its affiliates, or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if RSA, its affiliates, or its suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.
Security