SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2015:0529-1)

High Nessus Plugin ID 83702

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 12 kernel was updated to 3.12.38 to receive various security and bugfixes.

This update contains the following feature enablements :

- The remote block device (rbd) and ceph drivers have been enabled and are now supported. (FATE#318350) These can be used e.g. for accessing the SUSE Enterprise Storage product services.

- Support for Intel Select Bay trail CPUs has been added.
(FATE#316038)

Following security issues were fixed :

- CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 did not ensure that Thread Local Storage (TLS) descriptors were loaded before proceeding with other steps, which made it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address (bnc#911326).

- CVE-2014-7822: A flaw was found in the way the Linux kernels splice() system call validated its parameters.
On certain file systems, a local, unprivileged user could have used this flaw to write past the maximum file size, and thus crash the system.

- CVE-2014-8160: The connection tracking module could be bypassed if a specific protocol module was not loaded, e.g. allowing SCTP traffic while the firewall should have filtered it.

- CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a length value in the Extensions Reference (ER) System Use Field, which allowed local users to obtain sensitive information from kernel memory via a crafted iso9660 image (bnc#912654).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12 :

zypper in -t patch SUSE-SLE-WE-12-2015-130=1

SUSE Linux Enterprise Software Development Kit 12 :

zypper in -t patch SUSE-SLE-SDK-12-2015-130=1

SUSE Linux Enterprise Server 12 :

zypper in -t patch SUSE-SLE-SERVER-12-2015-130=1

SUSE Linux Enterprise Module for Public Cloud 12 :

zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2015-130=1

SUSE Linux Enterprise Live Patching 12 :

zypper in -t patch SUSE-SLE-Live-Patching-12-2015-130=1

SUSE Linux Enterprise Desktop 12 :

zypper in -t patch SUSE-SLE-DESKTOP-12-2015-130=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=799216

https://bugzilla.suse.com/show_bug.cgi?id=800255

https://bugzilla.suse.com/show_bug.cgi?id=860346

https://bugzilla.suse.com/show_bug.cgi?id=875220

https://bugzilla.suse.com/show_bug.cgi?id=877456

https://bugzilla.suse.com/show_bug.cgi?id=884407

https://bugzilla.suse.com/show_bug.cgi?id=895805

https://bugzilla.suse.com/show_bug.cgi?id=896484

https://bugzilla.suse.com/show_bug.cgi?id=897736

https://bugzilla.suse.com/show_bug.cgi?id=898687

https://bugzilla.suse.com/show_bug.cgi?id=900270

https://bugzilla.suse.com/show_bug.cgi?id=902286

https://bugzilla.suse.com/show_bug.cgi?id=902346

https://bugzilla.suse.com/show_bug.cgi?id=902349

https://bugzilla.suse.com/show_bug.cgi?id=903640

https://bugzilla.suse.com/show_bug.cgi?id=904177

https://bugzilla.suse.com/show_bug.cgi?id=904883

https://bugzilla.suse.com/show_bug.cgi?id=904899

https://bugzilla.suse.com/show_bug.cgi?id=904901

https://bugzilla.suse.com/show_bug.cgi?id=905100

https://bugzilla.suse.com/show_bug.cgi?id=905304

https://bugzilla.suse.com/show_bug.cgi?id=905329

https://bugzilla.suse.com/show_bug.cgi?id=905482

https://bugzilla.suse.com/show_bug.cgi?id=905783

https://bugzilla.suse.com/show_bug.cgi?id=906196

https://bugzilla.suse.com/show_bug.cgi?id=907069

https://bugzilla.suse.com/show_bug.cgi?id=908069

https://bugzilla.suse.com/show_bug.cgi?id=908322

https://bugzilla.suse.com/show_bug.cgi?id=908825

https://bugzilla.suse.com/show_bug.cgi?id=908904

https://bugzilla.suse.com/show_bug.cgi?id=909829

https://bugzilla.suse.com/show_bug.cgi?id=910322

https://bugzilla.suse.com/show_bug.cgi?id=911326

https://bugzilla.suse.com/show_bug.cgi?id=912202

https://bugzilla.suse.com/show_bug.cgi?id=912654

https://bugzilla.suse.com/show_bug.cgi?id=912705

https://bugzilla.suse.com/show_bug.cgi?id=913059

https://bugzilla.suse.com/show_bug.cgi?id=914112

https://bugzilla.suse.com/show_bug.cgi?id=914126

https://bugzilla.suse.com/show_bug.cgi?id=914254

https://bugzilla.suse.com/show_bug.cgi?id=914291

https://bugzilla.suse.com/show_bug.cgi?id=914294

https://bugzilla.suse.com/show_bug.cgi?id=914300

https://bugzilla.suse.com/show_bug.cgi?id=914457

https://bugzilla.suse.com/show_bug.cgi?id=914464

https://bugzilla.suse.com/show_bug.cgi?id=914726

https://bugzilla.suse.com/show_bug.cgi?id=915188

https://bugzilla.suse.com/show_bug.cgi?id=915322

https://bugzilla.suse.com/show_bug.cgi?id=915335

https://bugzilla.suse.com/show_bug.cgi?id=915425

https://bugzilla.suse.com/show_bug.cgi?id=915454

https://bugzilla.suse.com/show_bug.cgi?id=915456

https://bugzilla.suse.com/show_bug.cgi?id=915550

https://bugzilla.suse.com/show_bug.cgi?id=915660

https://bugzilla.suse.com/show_bug.cgi?id=916107

https://bugzilla.suse.com/show_bug.cgi?id=916513

https://bugzilla.suse.com/show_bug.cgi?id=916646

https://bugzilla.suse.com/show_bug.cgi?id=917089

https://bugzilla.suse.com/show_bug.cgi?id=917128

https://bugzilla.suse.com/show_bug.cgi?id=918161

https://bugzilla.suse.com/show_bug.cgi?id=918255

https://www.suse.com/security/cve/CVE-2014-3673/

https://www.suse.com/security/cve/CVE-2014-3687/

https://www.suse.com/security/cve/CVE-2014-7822/

https://www.suse.com/security/cve/CVE-2014-7841/

https://www.suse.com/security/cve/CVE-2014-8160/

https://www.suse.com/security/cve/CVE-2014-8559/

https://www.suse.com/security/cve/CVE-2014-9419/

https://www.suse.com/security/cve/CVE-2014-9584/

http://www.nessus.org/u?75cca7a0

Plugin Details

Severity: High

ID: 83702

File Name: suse_SU-2015-0529-1.nasl

Version: 2.13

Type: local

Agent: unix

Published: 2015/05/20

Updated: 2019/09/11

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo, p-cpe:/a:novell:suse_linux:kernel-xen-debugsource, p-cpe:/a:novell:suse_linux:kernel-xen-devel, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/02/20

Vulnerability Publication Date: 2014/11/10

Reference Information

CVE: CVE-2014-3673, CVE-2014-3687, CVE-2014-7822, CVE-2014-7841, CVE-2014-8160, CVE-2014-8559, CVE-2014-9419, CVE-2014-9584

BID: 70766, 70854, 70883, 71081, 71794, 71883, 72061, 72347