RHEL 8 : kernel-rt (RHSA-2022:1975)

critical Nessus Plugin ID 161034

Synopsis

The remote Red Hat host is missing one or more security updates for kernel-rt.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:1975 advisory.

- kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)

- kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)

- kernel: use-after-free in nouveau kernel module (CVE-2020-27820)

- kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)

- kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)

- kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)

- kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)

- kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)

- kernel: possible use-after-free in bluetooth module (CVE-2021-3752)

- kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)

- kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)

- kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)

- kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)

- kernel: stack information leak in infiniband RDMA (CVE-2021-3923)

- kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)

- kernel: security regression for CVE-2018-13405 (CVE-2021-4037)

- kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)

- kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io (CVE-2021-4093)

- kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)

- kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)

- kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)

- kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)

- hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)

- kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)

- kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)

- kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)

- kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)

- kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)

- kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)

- kernel: use-after-free in the TEE subsystem (CVE-2021-44733)

- kernel: information leak in the IPv6 implementation (CVE-2021-45485)

- kernel: information leak in the IPv4 implementation (CVE-2021-45486)

- hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)

- hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)

- kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)

- kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)

- kernel: information leak in copy_page_to_iter() in iov_iter.c (CVE-2022-0850)

- kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)

- kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() (CVE-2022-3105)

- kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() (CVE-2022-3106)

- kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() (CVE-2022-3108)

- kernel: Copy_from_user on 64-bit versions may leak kernel information (CVE-2023-0459)

- kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails (CVE-2023-3022)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kernel-rt package based on the guidance in RHSA-2022:1975.

See Also

http://www.nessus.org/u?6a0c9e83

http://www.nessus.org/u?9341665d

https://access.redhat.com/errata/RHSA-2022:1975

https://bugzilla.redhat.com/show_bug.cgi?id=1901726

https://bugzilla.redhat.com/show_bug.cgi?id=1903578

https://bugzilla.redhat.com/show_bug.cgi?id=1905749

https://bugzilla.redhat.com/show_bug.cgi?id=1919791

https://bugzilla.redhat.com/show_bug.cgi?id=1946684

https://bugzilla.redhat.com/show_bug.cgi?id=1951739

https://bugzilla.redhat.com/show_bug.cgi?id=1974079

https://bugzilla.redhat.com/show_bug.cgi?id=1985353

https://bugzilla.redhat.com/show_bug.cgi?id=1986473

https://bugzilla.redhat.com/show_bug.cgi?id=1997467

https://bugzilla.redhat.com/show_bug.cgi?id=1997961

https://bugzilla.redhat.com/show_bug.cgi?id=1999544

https://bugzilla.redhat.com/show_bug.cgi?id=1999675

https://bugzilla.redhat.com/show_bug.cgi?id=2000627

https://bugzilla.redhat.com/show_bug.cgi?id=2000694

https://bugzilla.redhat.com/show_bug.cgi?id=2004949

https://bugzilla.redhat.com/show_bug.cgi?id=2010463

https://bugzilla.redhat.com/show_bug.cgi?id=2013180

https://bugzilla.redhat.com/show_bug.cgi?id=2014230

https://bugzilla.redhat.com/show_bug.cgi?id=2016169

https://bugzilla.redhat.com/show_bug.cgi?id=2018205

https://bugzilla.redhat.com/show_bug.cgi?id=2025003

https://bugzilla.redhat.com/show_bug.cgi?id=2025726

https://bugzilla.redhat.com/show_bug.cgi?id=2027239

https://bugzilla.redhat.com/show_bug.cgi?id=2029923

https://bugzilla.redhat.com/show_bug.cgi?id=2030747

https://bugzilla.redhat.com/show_bug.cgi?id=2034342

https://bugzilla.redhat.com/show_bug.cgi?id=2035652

https://bugzilla.redhat.com/show_bug.cgi?id=2036934

https://bugzilla.redhat.com/show_bug.cgi?id=2037019

https://bugzilla.redhat.com/show_bug.cgi?id=2039911

https://bugzilla.redhat.com/show_bug.cgi?id=2039914

https://bugzilla.redhat.com/show_bug.cgi?id=2042822

https://bugzilla.redhat.com/show_bug.cgi?id=2061700

https://bugzilla.redhat.com/show_bug.cgi?id=2061712

https://bugzilla.redhat.com/show_bug.cgi?id=2061721

https://bugzilla.redhat.com/show_bug.cgi?id=2064855

https://access.redhat.com/security/updates/classification/#important

Plugin Details

Severity: Critical

ID: 161034

File Name: redhat-RHSA-2022-1975.nasl

Version: 1.9

Type: local

Agent: unix

Published: 5/11/2022

Updated: 4/28/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.9

Temporal Score: 6.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-3752

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2021-3773

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/10/2022

Vulnerability Publication Date: 6/9/2020

Reference Information

CVE: CVE-2020-0404, CVE-2020-13974, CVE-2020-27820, CVE-2021-0941, CVE-2021-20322, CVE-2021-26401, CVE-2021-29154, CVE-2021-3612, CVE-2021-3669, CVE-2021-37159, CVE-2021-3743, CVE-2021-3744, CVE-2021-3752, CVE-2021-3759, CVE-2021-3764, CVE-2021-3772, CVE-2021-3773, CVE-2021-3923, CVE-2021-4002, CVE-2021-4037, CVE-2021-4083, CVE-2021-4093, CVE-2021-4157, CVE-2021-41864, CVE-2021-4197, CVE-2021-4203, CVE-2021-42739, CVE-2021-43389, CVE-2021-43976, CVE-2021-44733, CVE-2021-45485, CVE-2021-45486, CVE-2022-0001, CVE-2022-0002, CVE-2022-0286, CVE-2022-0322, CVE-2022-0850, CVE-2022-1011, CVE-2022-3105, CVE-2022-3106, CVE-2022-3108, CVE-2023-0459, CVE-2023-3022

CWE: 119, 125, 190, 200, 284, 287, 327, 330, 354, 362, 401, 402, 416, 459, 476, 681, 770, 787, 843, 908

RHSA: 2022:1975