Scientific Linux Security Update : kernel on SL7.x x86_64

High Nessus Plugin ID 130078

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856)

- kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846)

- hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

- kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes :

- gfs2: Fix iomap write page reclaim deadlock (BZ#1737373)

- [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree (BZ#1740178)

- high update_cfs_rq_blocked_load contention (BZ#1740180)

- [Hyper-V][RHEL 7] kdump fails to start on a Hyper-V guest of Windows Server 2019. (BZ#1740188)

- kvm: backport cpuidle-haltpoll driver (BZ#1740192)

- Growing unreclaimable slab memory (BZ#1741920)

- [bnx2x] ping failed from pf to vf which has been attached to vm (BZ#1741926)

- [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with > 240 vCPUs (i.e., when in x2APIC mode) (BZ#1743324)

- Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid (BZ#1744442)

- RHEL 7.7 Beta - Hit error when trying to run nvme connect with IPv6 address (BZ#1744443)

- RHEL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system (BZ#1744444)

- NFSv4.0 client sending a double CLOSE (leading to EIO application failure) (BZ#1744946)

- [Azure] CRI-RDOS | [RHEL 7.8] Live migration only takes 10 seconds, but the VM was unavailable for 2 hours (BZ#1748239)

- NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments (BZ#1749290)

- [Inspur] RHEL7.6 ASPEED graphic card display issue (BZ#1749296)

- Allows macvlan to operated correctly over the active-backup mode to support bonding events.
(BZ#1751579)

- [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group (BZ#1752421)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1737373

https://bugzilla.redhat.com/show_bug.cgi?id=1740178

https://bugzilla.redhat.com/show_bug.cgi?id=1740180

https://bugzilla.redhat.com/show_bug.cgi?id=1740188

https://bugzilla.redhat.com/show_bug.cgi?id=1740192

https://bugzilla.redhat.com/show_bug.cgi?id=1741920

https://bugzilla.redhat.com/show_bug.cgi?id=1741926

https://bugzilla.redhat.com/show_bug.cgi?id=1743324

https://bugzilla.redhat.com/show_bug.cgi?id=1744442

https://bugzilla.redhat.com/show_bug.cgi?id=1744443

https://bugzilla.redhat.com/show_bug.cgi?id=1744444

https://bugzilla.redhat.com/show_bug.cgi?id=1744946

https://bugzilla.redhat.com/show_bug.cgi?id=1748239

https://bugzilla.redhat.com/show_bug.cgi?id=1749290

https://bugzilla.redhat.com/show_bug.cgi?id=1749296

https://bugzilla.redhat.com/show_bug.cgi?id=1751579

https://bugzilla.redhat.com/show_bug.cgi?id=1752421

http://www.nessus.org/u?3e7582ac

Plugin Details

Severity: High

ID: 130078

File Name: sl_20191016_kernel_on_SL7_x.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2019/10/21

Updated: 2019/10/21

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 8.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2019/10/16

Vulnerability Publication Date: 2019/06/03

Reference Information

CVE: CVE-2018-20856, CVE-2019-10126, CVE-2019-3846, CVE-2019-9506