SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:1123-1)

high Nessus Plugin ID 136075

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed :

CVE-2020-8834: KVM on Power8 processors had a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability to run code in kernel space of a guest VM can cause the host kernel to panic (bnc#1168276).

CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).

CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).

CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).

CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).

CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).

CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).

CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).

CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).

CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Module for Realtime 15-SP1:zypper in -t patch SUSE-SLE-Module-RT-15-SP1-2020-1123=1

SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1123=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1044231

https://bugzilla.suse.com/show_bug.cgi?id=1051510

https://bugzilla.suse.com/show_bug.cgi?id=1051858

https://bugzilla.suse.com/show_bug.cgi?id=1056686

https://bugzilla.suse.com/show_bug.cgi?id=1060463

https://bugzilla.suse.com/show_bug.cgi?id=1065729

https://bugzilla.suse.com/show_bug.cgi?id=1083647

https://bugzilla.suse.com/show_bug.cgi?id=1085030

https://bugzilla.suse.com/show_bug.cgi?id=1103990

https://bugzilla.suse.com/show_bug.cgi?id=1103992

https://bugzilla.suse.com/show_bug.cgi?id=1104353

https://bugzilla.suse.com/show_bug.cgi?id=1104745

https://bugzilla.suse.com/show_bug.cgi?id=1109837

https://bugzilla.suse.com/show_bug.cgi?id=1109911

https://bugzilla.suse.com/show_bug.cgi?id=1111666

https://bugzilla.suse.com/show_bug.cgi?id=1111974

https://bugzilla.suse.com/show_bug.cgi?id=1112178

https://bugzilla.suse.com/show_bug.cgi?id=1112374

https://bugzilla.suse.com/show_bug.cgi?id=1113956

https://bugzilla.suse.com/show_bug.cgi?id=1114279

https://bugzilla.suse.com/show_bug.cgi?id=1114685

https://bugzilla.suse.com/show_bug.cgi?id=1119680

https://bugzilla.suse.com/show_bug.cgi?id=1120386

https://bugzilla.suse.com/show_bug.cgi?id=1127611

https://bugzilla.suse.com/show_bug.cgi?id=1133021

https://bugzilla.suse.com/show_bug.cgi?id=1134090

https://bugzilla.suse.com/show_bug.cgi?id=1136157

https://bugzilla.suse.com/show_bug.cgi?id=1141895

https://bugzilla.suse.com/show_bug.cgi?id=1144333

https://bugzilla.suse.com/show_bug.cgi?id=1145051

https://bugzilla.suse.com/show_bug.cgi?id=1146539

https://bugzilla.suse.com/show_bug.cgi?id=1157424

https://bugzilla.suse.com/show_bug.cgi?id=1158187

https://bugzilla.suse.com/show_bug.cgi?id=1158983

https://bugzilla.suse.com/show_bug.cgi?id=1159198

https://bugzilla.suse.com/show_bug.cgi?id=1159285

https://bugzilla.suse.com/show_bug.cgi?id=1160659

https://bugzilla.suse.com/show_bug.cgi?id=1161561

https://bugzilla.suse.com/show_bug.cgi?id=1161951

https://bugzilla.suse.com/show_bug.cgi?id=1162171

https://bugzilla.suse.com/show_bug.cgi?id=1162929

https://bugzilla.suse.com/show_bug.cgi?id=1162931

https://bugzilla.suse.com/show_bug.cgi?id=1164078

https://bugzilla.suse.com/show_bug.cgi?id=1164507

https://bugzilla.suse.com/show_bug.cgi?id=1164777

https://bugzilla.suse.com/show_bug.cgi?id=1164780

https://bugzilla.suse.com/show_bug.cgi?id=1164893

https://bugzilla.suse.com/show_bug.cgi?id=1165019

https://bugzilla.suse.com/show_bug.cgi?id=1165111

https://bugzilla.suse.com/show_bug.cgi?id=1165182

https://bugzilla.suse.com/show_bug.cgi?id=1165185

https://bugzilla.suse.com/show_bug.cgi?id=1165211

https://bugzilla.suse.com/show_bug.cgi?id=1165404

https://bugzilla.suse.com/show_bug.cgi?id=1165488

https://bugzilla.suse.com/show_bug.cgi?id=1165527

https://bugzilla.suse.com/show_bug.cgi?id=1165741

https://bugzilla.suse.com/show_bug.cgi?id=1165813

https://bugzilla.suse.com/show_bug.cgi?id=1165823

https://bugzilla.suse.com/show_bug.cgi?id=1165873

https://bugzilla.suse.com/show_bug.cgi?id=1165929

https://bugzilla.suse.com/show_bug.cgi?id=1165949

https://bugzilla.suse.com/show_bug.cgi?id=1165950

https://bugzilla.suse.com/show_bug.cgi?id=1165980

https://bugzilla.suse.com/show_bug.cgi?id=1165984

https://bugzilla.suse.com/show_bug.cgi?id=1165985

https://bugzilla.suse.com/show_bug.cgi?id=1166003

https://bugzilla.suse.com/show_bug.cgi?id=1166101

https://bugzilla.suse.com/show_bug.cgi?id=1166102

https://bugzilla.suse.com/show_bug.cgi?id=1166103

https://bugzilla.suse.com/show_bug.cgi?id=1166104

https://bugzilla.suse.com/show_bug.cgi?id=1166632

https://bugzilla.suse.com/show_bug.cgi?id=1166730

https://bugzilla.suse.com/show_bug.cgi?id=1166731

https://bugzilla.suse.com/show_bug.cgi?id=1166732

https://bugzilla.suse.com/show_bug.cgi?id=1166733

https://bugzilla.suse.com/show_bug.cgi?id=1166734

https://bugzilla.suse.com/show_bug.cgi?id=1166735

https://bugzilla.suse.com/show_bug.cgi?id=1166982

https://bugzilla.suse.com/show_bug.cgi?id=1167005

https://bugzilla.suse.com/show_bug.cgi?id=1167216

https://bugzilla.suse.com/show_bug.cgi?id=1167290

https://bugzilla.suse.com/show_bug.cgi?id=1167316

https://bugzilla.suse.com/show_bug.cgi?id=1167421

https://bugzilla.suse.com/show_bug.cgi?id=1167423

https://bugzilla.suse.com/show_bug.cgi?id=1167627

https://bugzilla.suse.com/show_bug.cgi?id=1167629

https://bugzilla.suse.com/show_bug.cgi?id=1168075

https://bugzilla.suse.com/show_bug.cgi?id=1168273

https://bugzilla.suse.com/show_bug.cgi?id=1168276

https://bugzilla.suse.com/show_bug.cgi?id=1168295

https://bugzilla.suse.com/show_bug.cgi?id=1168367

https://bugzilla.suse.com/show_bug.cgi?id=1168424

https://bugzilla.suse.com/show_bug.cgi?id=1168443

https://bugzilla.suse.com/show_bug.cgi?id=1168552

https://bugzilla.suse.com/show_bug.cgi?id=1168829

https://bugzilla.suse.com/show_bug.cgi?id=1168854

https://bugzilla.suse.com/show_bug.cgi?id=1169013

https://bugzilla.suse.com/show_bug.cgi?id=1169307

https://bugzilla.suse.com/show_bug.cgi?id=1169308

https://www.suse.com/security/cve/CVE-2019-19768/

https://www.suse.com/security/cve/CVE-2019-19770/

https://www.suse.com/security/cve/CVE-2019-3701/

https://www.suse.com/security/cve/CVE-2019-9458/

https://www.suse.com/security/cve/CVE-2020-10942/

https://www.suse.com/security/cve/CVE-2020-11494/

https://www.suse.com/security/cve/CVE-2020-8647/

https://www.suse.com/security/cve/CVE-2020-8649/

https://www.suse.com/security/cve/CVE-2020-8834/

https://www.suse.com/security/cve/CVE-2020-9383/

http://www.nessus.org/u?810933fe

Plugin Details

Severity: High

ID: 136075

File Name: suse_SU-2020-1123-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 4/29/2020

Updated: 3/14/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2019-19770

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt, p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt_debug, p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt_debug-debuginfo, p-cpe:/a:novell:suse_linux:dlm-kmp-rt, p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:dlm-kmp-rt_debug, p-cpe:/a:novell:suse_linux:dlm-kmp-rt_debug-debuginfo, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt_debug, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt_debug-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt, p-cpe:/a:novell:suse_linux:kernel-rt-base, p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt-debugsource, p-cpe:/a:novell:suse_linux:kernel-rt-devel, p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt-extra, p-cpe:/a:novell:suse_linux:kernel-rt-extra-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-rt_debug, p-cpe:/a:novell:suse_linux:reiserfs-kmp-rt, p-cpe:/a:novell:suse_linux:reiserfs-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:reiserfs-kmp-rt_debug, p-cpe:/a:novell:suse_linux:reiserfs-kmp-rt_debug-debuginfo, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-rt_debug-base, p-cpe:/a:novell:suse_linux:kernel-rt_debug-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt_debug-extra, p-cpe:/a:novell:suse_linux:kernel-rt_debug-extra-debuginfo, p-cpe:/a:novell:suse_linux:kernel-rt_debug-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-syms-rt, p-cpe:/a:novell:suse_linux:kselftests-kmp-rt, p-cpe:/a:novell:suse_linux:kselftests-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:kselftests-kmp-rt_debug, p-cpe:/a:novell:suse_linux:kselftests-kmp-rt_debug-debuginfo, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt_debug, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt_debug-debuginfo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/27/2020

Vulnerability Publication Date: 1/3/2019

Reference Information

CVE: CVE-2019-19768, CVE-2019-19770, CVE-2019-3701, CVE-2019-9458, CVE-2020-10942, CVE-2020-11494, CVE-2020-8647, CVE-2020-8649, CVE-2020-8834, CVE-2020-9383