SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0901-1)

high Nessus Plugin ID 123927

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.

The following security bugs were fixed :

CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).

CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).

CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)

CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).

CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).

CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).

CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-901=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1012382

https://bugzilla.suse.com/show_bug.cgi?id=1020413

https://bugzilla.suse.com/show_bug.cgi?id=1023175

https://bugzilla.suse.com/show_bug.cgi?id=1031492

https://bugzilla.suse.com/show_bug.cgi?id=1042286

https://bugzilla.suse.com/show_bug.cgi?id=1050549

https://bugzilla.suse.com/show_bug.cgi?id=1065600

https://bugzilla.suse.com/show_bug.cgi?id=1070767

https://bugzilla.suse.com/show_bug.cgi?id=1075697

https://bugzilla.suse.com/show_bug.cgi?id=1078355

https://bugzilla.suse.com/show_bug.cgi?id=1082943

https://bugzilla.suse.com/show_bug.cgi?id=1086095

https://bugzilla.suse.com/show_bug.cgi?id=1086652

https://bugzilla.suse.com/show_bug.cgi?id=1087036

https://bugzilla.suse.com/show_bug.cgi?id=1087092

https://bugzilla.suse.com/show_bug.cgi?id=1090435

https://bugzilla.suse.com/show_bug.cgi?id=1094823

https://bugzilla.suse.com/show_bug.cgi?id=1099810

https://bugzilla.suse.com/show_bug.cgi?id=1102875

https://bugzilla.suse.com/show_bug.cgi?id=1102877

https://bugzilla.suse.com/show_bug.cgi?id=1102879

https://bugzilla.suse.com/show_bug.cgi?id=1102882

https://bugzilla.suse.com/show_bug.cgi?id=1102896

https://bugzilla.suse.com/show_bug.cgi?id=1102959

https://bugzilla.suse.com/show_bug.cgi?id=1103429

https://bugzilla.suse.com/show_bug.cgi?id=1105428

https://bugzilla.suse.com/show_bug.cgi?id=1106061

https://bugzilla.suse.com/show_bug.cgi?id=1106105

https://bugzilla.suse.com/show_bug.cgi?id=1106929

https://bugzilla.suse.com/show_bug.cgi?id=1107866

https://bugzilla.suse.com/show_bug.cgi?id=1109137

https://bugzilla.suse.com/show_bug.cgi?id=1109248

https://bugzilla.suse.com/show_bug.cgi?id=1109695

https://bugzilla.suse.com/show_bug.cgi?id=1114893

https://bugzilla.suse.com/show_bug.cgi?id=1116345

https://bugzilla.suse.com/show_bug.cgi?id=1116653

https://bugzilla.suse.com/show_bug.cgi?id=1117108

https://bugzilla.suse.com/show_bug.cgi?id=1117645

https://bugzilla.suse.com/show_bug.cgi?id=1117744

https://bugzilla.suse.com/show_bug.cgi?id=1119019

https://bugzilla.suse.com/show_bug.cgi?id=1119680

https://bugzilla.suse.com/show_bug.cgi?id=1119843

https://bugzilla.suse.com/show_bug.cgi?id=1120017

https://bugzilla.suse.com/show_bug.cgi?id=1120691

https://bugzilla.suse.com/show_bug.cgi?id=1120722

https://bugzilla.suse.com/show_bug.cgi?id=1120758

https://bugzilla.suse.com/show_bug.cgi?id=1120902

https://bugzilla.suse.com/show_bug.cgi?id=1121713

https://bugzilla.suse.com/show_bug.cgi?id=1121726

https://bugzilla.suse.com/show_bug.cgi?id=1121805

https://bugzilla.suse.com/show_bug.cgi?id=1122650

https://bugzilla.suse.com/show_bug.cgi?id=1122651

https://bugzilla.suse.com/show_bug.cgi?id=1122779

https://bugzilla.suse.com/show_bug.cgi?id=1122885

https://bugzilla.suse.com/show_bug.cgi?id=1123321

https://bugzilla.suse.com/show_bug.cgi?id=1123323

https://bugzilla.suse.com/show_bug.cgi?id=1123357

https://bugzilla.suse.com/show_bug.cgi?id=1123933

https://bugzilla.suse.com/show_bug.cgi?id=1124166

https://bugzilla.suse.com/show_bug.cgi?id=1124235

https://bugzilla.suse.com/show_bug.cgi?id=1124728

https://bugzilla.suse.com/show_bug.cgi?id=1124732

https://bugzilla.suse.com/show_bug.cgi?id=1124735

https://bugzilla.suse.com/show_bug.cgi?id=1124775

https://bugzilla.suse.com/show_bug.cgi?id=1124777

https://bugzilla.suse.com/show_bug.cgi?id=1124780

https://bugzilla.suse.com/show_bug.cgi?id=1124811

https://bugzilla.suse.com/show_bug.cgi?id=1125000

https://bugzilla.suse.com/show_bug.cgi?id=1125014

https://bugzilla.suse.com/show_bug.cgi?id=1125315

https://bugzilla.suse.com/show_bug.cgi?id=1125446

https://bugzilla.suse.com/show_bug.cgi?id=1125794

https://bugzilla.suse.com/show_bug.cgi?id=1125796

https://bugzilla.suse.com/show_bug.cgi?id=1125808

https://bugzilla.suse.com/show_bug.cgi?id=1125809

https://bugzilla.suse.com/show_bug.cgi?id=1125810

https://bugzilla.suse.com/show_bug.cgi?id=1125892

https://bugzilla.suse.com/show_bug.cgi?id=1126389

https://bugzilla.suse.com/show_bug.cgi?id=1126772

https://bugzilla.suse.com/show_bug.cgi?id=1126773

https://bugzilla.suse.com/show_bug.cgi?id=1126805

https://bugzilla.suse.com/show_bug.cgi?id=1127082

https://bugzilla.suse.com/show_bug.cgi?id=1127155

https://bugzilla.suse.com/show_bug.cgi?id=1127561

https://bugzilla.suse.com/show_bug.cgi?id=1127725

https://bugzilla.suse.com/show_bug.cgi?id=1127731

https://bugzilla.suse.com/show_bug.cgi?id=1127961

https://bugzilla.suse.com/show_bug.cgi?id=1128166

https://bugzilla.suse.com/show_bug.cgi?id=1128452

https://bugzilla.suse.com/show_bug.cgi?id=1128565

https://bugzilla.suse.com/show_bug.cgi?id=1128696

https://bugzilla.suse.com/show_bug.cgi?id=1128756

https://bugzilla.suse.com/show_bug.cgi?id=1128893

https://bugzilla.suse.com/show_bug.cgi?id=1129080

https://bugzilla.suse.com/show_bug.cgi?id=1129179

https://bugzilla.suse.com/show_bug.cgi?id=1129237

https://bugzilla.suse.com/show_bug.cgi?id=1129238

https://bugzilla.suse.com/show_bug.cgi?id=1129239

https://bugzilla.suse.com/show_bug.cgi?id=1129240

https://bugzilla.suse.com/show_bug.cgi?id=1129241

https://bugzilla.suse.com/show_bug.cgi?id=1129413

https://bugzilla.suse.com/show_bug.cgi?id=1129414

https://bugzilla.suse.com/show_bug.cgi?id=1129415

https://bugzilla.suse.com/show_bug.cgi?id=1129416

https://bugzilla.suse.com/show_bug.cgi?id=1129417

https://bugzilla.suse.com/show_bug.cgi?id=1129418

https://bugzilla.suse.com/show_bug.cgi?id=1129419

https://bugzilla.suse.com/show_bug.cgi?id=1129581

https://bugzilla.suse.com/show_bug.cgi?id=1129770

https://bugzilla.suse.com/show_bug.cgi?id=1129923

https://www.suse.com/security/cve/CVE-2017-18249/

https://www.suse.com/security/cve/CVE-2019-2024/

https://www.suse.com/security/cve/CVE-2019-3459/

https://www.suse.com/security/cve/CVE-2019-3460/

https://www.suse.com/security/cve/CVE-2019-6974/

https://www.suse.com/security/cve/CVE-2019-7221/

https://www.suse.com/security/cve/CVE-2019-7222/

https://www.suse.com/security/cve/CVE-2019-9213/

http://www.nessus.org/u?fced5977

Plugin Details

Severity: High

ID: 123927

File Name: suse_SU-2019-0901-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 4/9/2019

Updated: 5/20/2022

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-2024

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2019-6974

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-debugsource, p-cpe:/a:novell:suse_linux:kernel-azure-base, p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-azure

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/8/2019

Vulnerability Publication Date: 3/26/2018

Exploitable With

Metasploit (Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation)

Reference Information

CVE: CVE-2017-18249, CVE-2019-2024, CVE-2019-3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-2019-9213