SUSE SLES12 Security Update : kernel (SUSE-SU-2021:2643-1)

high Nessus Plugin ID 152481

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2643-1 advisory.

- In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed.
User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:
A-152735806 (CVE-2020-0429)

- An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after- free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c. (CVE-2020-36385)

- An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of- bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. (CVE-2020-36386)

- An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (CVE-2021-22543)

- A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.
This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space (CVE-2021-22555)

- fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. (CVE-2021-33909)

- kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)

- An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-3612)

- arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1085224

https://bugzilla.suse.com/1094840

https://bugzilla.suse.com/1113295

https://bugzilla.suse.com/1153720

https://bugzilla.suse.com/1170511

https://bugzilla.suse.com/1176724

https://bugzilla.suse.com/1176931

https://bugzilla.suse.com/1176940

https://bugzilla.suse.com/1179195

https://bugzilla.suse.com/1181161

https://bugzilla.suse.com/1183871

https://bugzilla.suse.com/1184114

https://bugzilla.suse.com/1184350

https://bugzilla.suse.com/1184804

https://bugzilla.suse.com/1185032

https://bugzilla.suse.com/1185308

https://bugzilla.suse.com/1185377

https://bugzilla.suse.com/1185791

https://bugzilla.suse.com/1185995

https://bugzilla.suse.com/1186206

https://bugzilla.suse.com/1186482

https://bugzilla.suse.com/1186672

https://bugzilla.suse.com/1187038

https://bugzilla.suse.com/1187050

https://bugzilla.suse.com/1187215

https://bugzilla.suse.com/1187476

https://bugzilla.suse.com/1187585

https://bugzilla.suse.com/1187846

https://bugzilla.suse.com/1188026

https://bugzilla.suse.com/1188062

https://bugzilla.suse.com/1188101

https://bugzilla.suse.com/1188116

https://bugzilla.suse.com/1188273

https://bugzilla.suse.com/1188274

https://bugzilla.suse.com/1188405

https://bugzilla.suse.com/1188620

https://bugzilla.suse.com/1188750

https://bugzilla.suse.com/1188838

https://bugzilla.suse.com/1188842

https://bugzilla.suse.com/1188876

https://bugzilla.suse.com/1188885

https://bugzilla.suse.com/1188973

http://www.nessus.org/u?fb0d8c01

https://www.suse.com/security/cve/CVE-2020-0429

https://www.suse.com/security/cve/CVE-2020-36385

https://www.suse.com/security/cve/CVE-2020-36386

https://www.suse.com/security/cve/CVE-2021-22543

https://www.suse.com/security/cve/CVE-2021-22555

https://www.suse.com/security/cve/CVE-2021-33909

https://www.suse.com/security/cve/CVE-2021-3609

https://www.suse.com/security/cve/CVE-2021-3612

https://www.suse.com/security/cve/CVE-2021-3659

https://www.suse.com/security/cve/CVE-2021-37576

Plugin Details

Severity: High

ID: 152481

File Name: suse_SU-2021-2643-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/11/2021

Updated: 1/20/2022

Supported Sensors: Nessus Agent

Risk Information

CVSS Score Source: CVE-2021-37576

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt, p-cpe:/a:novell:suse_linux:dlm-kmp-rt, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-devel-rt, p-cpe:/a:novell:suse_linux:kernel-rt, p-cpe:/a:novell:suse_linux:kernel-rt-base, p-cpe:/a:novell:suse_linux:kernel-rt-devel, p-cpe:/a:novell:suse_linux:kernel-rt_debug, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel, p-cpe:/a:novell:suse_linux:kernel-source-rt, p-cpe:/a:novell:suse_linux:kernel-syms-rt, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/10/2021

Vulnerability Publication Date: 9/17/2020

Exploitable With

Metasploit (Netfilter x_tables Heap OOB Write Privilege Escalation)

Reference Information

CVE: CVE-2020-0429, CVE-2020-36385, CVE-2020-36386, CVE-2021-3609, CVE-2021-3612, CVE-2021-3659, CVE-2021-22543, CVE-2021-22555, CVE-2021-33909, CVE-2021-37576

SuSE: SUSE-SU-2021:2643-1

IAVA: 2021-A-0350