Rocky Linux 8 : kernel (RLSA-2021:3057)

high Nessus Plugin ID 157745

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2021:3057 advisory.

- An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (CVE-2021-22543)

- A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c.
This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space (CVE-2021-22555)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2021:3057

https://bugzilla.redhat.com/show_bug.cgi?id=1965461

https://bugzilla.redhat.com/show_bug.cgi?id=1971651

https://bugzilla.redhat.com/show_bug.cgi?id=1980101

Plugin Details

Severity: High

ID: 157745

File Name: rocky_linux_RLSA-2021-3057.nasl

Version: 1.7

Type: local

Published: 2/9/2022

Updated: 8/15/2022

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 6

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2021-3609

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

CVSS Score Source: CVE-2021-22555

Vulnerability Information

CPE: p-cpe:2.3:a:rocky:linux:bpftool-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debuginfo-common-aarch64:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-tools-libs-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:perf-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug-core:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-modules:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug-modules:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-tools-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-modules-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-tools:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug-modules-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debug-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-abi-stablelists:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:bpftool:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-core:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-tools-libs:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-debuginfo-common-x86_64:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:python3-perf:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:python3-perf-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:perf:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-headers:*:*:*:*:*:*:*, p-cpe:2.3:a:rocky:linux:kernel-cross-headers:*:*:*:*:*:*:*, cpe:2.3:o:rocky:linux:8:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/12/2021

Vulnerability Publication Date: 4/20/2021

Exploitable With

CANVAS (CANVAS)

Metasploit (Netfilter x_tables Heap OOB Write Privilege Escalation)

Reference Information

CVE: CVE-2021-3609, CVE-2021-22543, CVE-2021-22555

RLSA: 2021:3057