SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:1772-1)

high Nessus Plugin ID 110660

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.136 to receive various security and bugfixes. The following security bugs were fixed :

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356).

- CVE-2017-18249: The add_free_nid function did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX registers) between processes.
These registers might contain encryption keys when doing SSE accelerated AES enc/decryption (bsc#1087086).

- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure (bnc#1086400).

- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read (bnc#1073311).

- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12-SP3:zypper in -t patch SUSE-SLE-WE-12-SP3-2018-1199=1

SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1199=1

SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1199=1

SUSE Linux Enterprise Live Patching 12-SP3:zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-1199=1

SUSE Linux Enterprise High Availability 12-SP3:zypper in -t patch SUSE-SLE-HA-12-SP3-2018-1199=1

SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1199=1

SUSE CaaS Platform ALL :

To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1012382

https://bugzilla.suse.com/show_bug.cgi?id=1024718

https://bugzilla.suse.com/show_bug.cgi?id=1031717

https://bugzilla.suse.com/show_bug.cgi?id=1035432

https://bugzilla.suse.com/show_bug.cgi?id=1041740

https://bugzilla.suse.com/show_bug.cgi?id=1045330

https://bugzilla.suse.com/show_bug.cgi?id=1056415

https://bugzilla.suse.com/show_bug.cgi?id=1066223

https://bugzilla.suse.com/show_bug.cgi?id=1068032

https://bugzilla.suse.com/show_bug.cgi?id=1068054

https://bugzilla.suse.com/show_bug.cgi?id=1068951

https://bugzilla.suse.com/show_bug.cgi?id=1070404

https://bugzilla.suse.com/show_bug.cgi?id=1073311

https://bugzilla.suse.com/show_bug.cgi?id=1075428

https://bugzilla.suse.com/show_bug.cgi?id=1076049

https://bugzilla.suse.com/show_bug.cgi?id=1078583

https://bugzilla.suse.com/show_bug.cgi?id=1079152

https://bugzilla.suse.com/show_bug.cgi?id=1080542

https://bugzilla.suse.com/show_bug.cgi?id=1080656

https://bugzilla.suse.com/show_bug.cgi?id=1081500

https://bugzilla.suse.com/show_bug.cgi?id=1081514

https://bugzilla.suse.com/show_bug.cgi?id=1082153

https://bugzilla.suse.com/show_bug.cgi?id=1082504

https://bugzilla.suse.com/show_bug.cgi?id=1082979

https://bugzilla.suse.com/show_bug.cgi?id=1085185

https://bugzilla.suse.com/show_bug.cgi?id=1085308

https://bugzilla.suse.com/show_bug.cgi?id=1086400

https://bugzilla.suse.com/show_bug.cgi?id=1086716

https://bugzilla.suse.com/show_bug.cgi?id=1087036

https://bugzilla.suse.com/show_bug.cgi?id=1087086

https://bugzilla.suse.com/show_bug.cgi?id=1088871

https://bugzilla.suse.com/show_bug.cgi?id=1090435

https://bugzilla.suse.com/show_bug.cgi?id=1090534

https://bugzilla.suse.com/show_bug.cgi?id=1090734

https://bugzilla.suse.com/show_bug.cgi?id=1090955

https://bugzilla.suse.com/show_bug.cgi?id=1091594

https://bugzilla.suse.com/show_bug.cgi?id=1094532

https://bugzilla.suse.com/show_bug.cgi?id=1095042

https://bugzilla.suse.com/show_bug.cgi?id=1095147

https://bugzilla.suse.com/show_bug.cgi?id=1096037

https://bugzilla.suse.com/show_bug.cgi?id=1096140

https://bugzilla.suse.com/show_bug.cgi?id=1096214

https://bugzilla.suse.com/show_bug.cgi?id=1096242

https://bugzilla.suse.com/show_bug.cgi?id=1096281

https://bugzilla.suse.com/show_bug.cgi?id=1096751

https://bugzilla.suse.com/show_bug.cgi?id=1096982

https://bugzilla.suse.com/show_bug.cgi?id=1097234

https://bugzilla.suse.com/show_bug.cgi?id=1097356

https://bugzilla.suse.com/show_bug.cgi?id=1098009

https://bugzilla.suse.com/show_bug.cgi?id=1098012

https://bugzilla.suse.com/show_bug.cgi?id=971975

https://bugzilla.suse.com/show_bug.cgi?id=973378

https://bugzilla.suse.com/show_bug.cgi?id=978907

https://www.suse.com/security/cve/CVE-2017-17741/

https://www.suse.com/security/cve/CVE-2017-18241/

https://www.suse.com/security/cve/CVE-2017-18249/

https://www.suse.com/security/cve/CVE-2018-12233/

https://www.suse.com/security/cve/CVE-2018-3665/

https://www.suse.com/security/cve/CVE-2018-5848/

http://www.nessus.org/u?54699579

Plugin Details

Severity: High

ID: 110660

File Name: suse_SU-2018-1772-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/22/2018

Updated: 9/17/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-12233

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2018-5848

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/21/2018

Vulnerability Publication Date: 12/18/2017

Reference Information

CVE: CVE-2017-17741, CVE-2017-18241, CVE-2017-18249, CVE-2018-12233, CVE-2018-3665, CVE-2018-5848