RHEL 8 : kernel (RHSA-2020:0204)

critical Nessus Plugin ID 133221
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:0204 advisory.

- hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)

- kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)

- hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)

- hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)

- kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

- hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)

- kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)

- Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

- kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)

- Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)

- Kernel: page cache side channel attacks (CVE-2019-5489)

- hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://cwe.mitre.org/data/definitions/122.html

https://cwe.mitre.org/data/definitions/200.html

https://cwe.mitre.org/data/definitions/203.html

https://cwe.mitre.org/data/definitions/226.html

https://cwe.mitre.org/data/definitions/284.html

https://cwe.mitre.org/data/definitions/327.html

https://cwe.mitre.org/data/definitions/385.html

https://cwe.mitre.org/data/definitions/400.html

https://cwe.mitre.org/data/definitions/416.html

https://cwe.mitre.org/data/definitions/787.html

https://cwe.mitre.org/data/definitions/835.html

https://access.redhat.com/security/cve/CVE-2018-12207

https://access.redhat.com/security/cve/CVE-2018-16884

https://access.redhat.com/security/cve/CVE-2019-0154

https://access.redhat.com/security/cve/CVE-2019-0155

https://access.redhat.com/security/cve/CVE-2019-3900

https://access.redhat.com/security/cve/CVE-2019-5489

https://access.redhat.com/security/cve/CVE-2019-9506

https://access.redhat.com/security/cve/CVE-2019-10126

https://access.redhat.com/security/cve/CVE-2019-11135

https://access.redhat.com/security/cve/CVE-2019-14816

https://access.redhat.com/security/cve/CVE-2019-14821

https://access.redhat.com/security/cve/CVE-2019-14901

https://access.redhat.com/errata/RHSA-2020:0204

https://bugzilla.redhat.com/1646768

https://bugzilla.redhat.com/1660375

https://bugzilla.redhat.com/1664110

https://bugzilla.redhat.com/1698757

https://bugzilla.redhat.com/1716992

https://bugzilla.redhat.com/1724393

https://bugzilla.redhat.com/1724398

https://bugzilla.redhat.com/1727857

https://bugzilla.redhat.com/1744149

https://bugzilla.redhat.com/1746708

https://bugzilla.redhat.com/1753062

https://bugzilla.redhat.com/1773519

Plugin Details

Severity: Critical

ID: 133221

File Name: redhat-RHSA-2020-0204.nasl

Version: 1.5

Type: local

Agent: unix

Published: 1/24/2020

Updated: 7/21/2021

Dependencies: ssh_get_info.nasl, redhat_repos.nasl, linux_alt_patch_detect.nasl

Risk Information

CVSS Score Source: CVE-2019-14901

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:redhat:rhel_e4s:8.0, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists, p-cpe:/a:redhat:enterprise_linux:kernel-core, p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:python3-perf

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/22/2020

Vulnerability Publication Date: 12/18/2018

Reference Information

CVE: CVE-2018-12207, CVE-2018-16884, CVE-2019-0154, CVE-2019-0155, CVE-2019-3900, CVE-2019-5489, CVE-2019-9506, CVE-2019-10126, CVE-2019-11135, CVE-2019-14816, CVE-2019-14821, CVE-2019-14901

BID: 106253, 106478, 108076, 108817

RHSA: 2020:0204

CWE: 122, 200, 203, 226, 284, 327, 385, 400, 416, 787, 835