SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1118-1)

high Nessus Plugin ID 136025

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 12 SP5 azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed :

CVE-2020-8834: KVM on Power8 processors had a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability to run code in kernel space of a guest VM can cause the host kernel to panic (bnc#1168276).

CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).

CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).

CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).

CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).

CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).

CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).

CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).

CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).

CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bnc#1165111).

CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).

CVE-2018-20836: Fixed an issue where a race condition in smp_task_timedout() and smp_task_done() could lead to a use-after-free (bnc#1134395).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-SP5:zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-1118=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1145929

https://bugzilla.suse.com/show_bug.cgi?id=1146539

https://bugzilla.suse.com/show_bug.cgi?id=1148868

https://bugzilla.suse.com/show_bug.cgi?id=1154385

https://bugzilla.suse.com/show_bug.cgi?id=1156510

https://bugzilla.suse.com/show_bug.cgi?id=1157424

https://bugzilla.suse.com/show_bug.cgi?id=1158187

https://bugzilla.suse.com/show_bug.cgi?id=1158552

https://bugzilla.suse.com/show_bug.cgi?id=1158983

https://bugzilla.suse.com/show_bug.cgi?id=1159037

https://bugzilla.suse.com/show_bug.cgi?id=1159142

https://bugzilla.suse.com/show_bug.cgi?id=1159198

https://bugzilla.suse.com/show_bug.cgi?id=1165111

https://bugzilla.suse.com/show_bug.cgi?id=1165182

https://bugzilla.suse.com/show_bug.cgi?id=1165185

https://bugzilla.suse.com/show_bug.cgi?id=1165211

https://bugzilla.suse.com/show_bug.cgi?id=1165404

https://bugzilla.suse.com/show_bug.cgi?id=1165488

https://bugzilla.suse.com/show_bug.cgi?id=1165527

https://bugzilla.suse.com/show_bug.cgi?id=1165581

https://bugzilla.suse.com/show_bug.cgi?id=1165741

https://bugzilla.suse.com/show_bug.cgi?id=1165813

https://bugzilla.suse.com/show_bug.cgi?id=1165823

https://bugzilla.suse.com/show_bug.cgi?id=1165873

https://bugzilla.suse.com/show_bug.cgi?id=1165929

https://bugzilla.suse.com/show_bug.cgi?id=1165949

https://bugzilla.suse.com/show_bug.cgi?id=1165950

https://bugzilla.suse.com/show_bug.cgi?id=1166864

https://bugzilla.suse.com/show_bug.cgi?id=1166866

https://bugzilla.suse.com/show_bug.cgi?id=1166867

https://bugzilla.suse.com/show_bug.cgi?id=1166868

https://bugzilla.suse.com/show_bug.cgi?id=1166870

https://bugzilla.suse.com/show_bug.cgi?id=1166940

https://bugzilla.suse.com/show_bug.cgi?id=1166982

https://bugzilla.suse.com/show_bug.cgi?id=1167005

https://bugzilla.suse.com/show_bug.cgi?id=1167216

https://bugzilla.suse.com/show_bug.cgi?id=1167288

https://bugzilla.suse.com/show_bug.cgi?id=1167290

https://bugzilla.suse.com/show_bug.cgi?id=1167316

https://bugzilla.suse.com/show_bug.cgi?id=1167421

https://bugzilla.suse.com/show_bug.cgi?id=1167423

https://bugzilla.suse.com/show_bug.cgi?id=1167627

http://www.nessus.org/u?4f96f5eb

https://bugzilla.suse.com/show_bug.cgi?id=1044231

https://bugzilla.suse.com/show_bug.cgi?id=1050549

https://bugzilla.suse.com/show_bug.cgi?id=1051510

https://bugzilla.suse.com/show_bug.cgi?id=1051858

https://bugzilla.suse.com/show_bug.cgi?id=1056686

https://bugzilla.suse.com/show_bug.cgi?id=1060463

https://bugzilla.suse.com/show_bug.cgi?id=1065600

https://bugzilla.suse.com/show_bug.cgi?id=1065729

https://bugzilla.suse.com/show_bug.cgi?id=1083647

https://bugzilla.suse.com/show_bug.cgi?id=1085030

https://bugzilla.suse.com/show_bug.cgi?id=1088810

https://bugzilla.suse.com/show_bug.cgi?id=1103990

https://bugzilla.suse.com/show_bug.cgi?id=1103992

https://bugzilla.suse.com/show_bug.cgi?id=1104353

https://bugzilla.suse.com/show_bug.cgi?id=1104745

https://bugzilla.suse.com/show_bug.cgi?id=1104967

https://bugzilla.suse.com/show_bug.cgi?id=1109837

https://bugzilla.suse.com/show_bug.cgi?id=1109911

https://bugzilla.suse.com/show_bug.cgi?id=1111666

https://bugzilla.suse.com/show_bug.cgi?id=1111974

https://bugzilla.suse.com/show_bug.cgi?id=1112178

https://bugzilla.suse.com/show_bug.cgi?id=1112374

https://bugzilla.suse.com/show_bug.cgi?id=1112504

https://bugzilla.suse.com/show_bug.cgi?id=1113956

https://bugzilla.suse.com/show_bug.cgi?id=1114279

https://bugzilla.suse.com/show_bug.cgi?id=1114685

https://bugzilla.suse.com/show_bug.cgi?id=1118338

https://bugzilla.suse.com/show_bug.cgi?id=1119680

https://bugzilla.suse.com/show_bug.cgi?id=1120386

https://bugzilla.suse.com/show_bug.cgi?id=1123328

https://bugzilla.suse.com/show_bug.cgi?id=1127611

https://bugzilla.suse.com/show_bug.cgi?id=1133021

https://bugzilla.suse.com/show_bug.cgi?id=1134090

https://bugzilla.suse.com/show_bug.cgi?id=1134395

https://bugzilla.suse.com/show_bug.cgi?id=1136157

https://bugzilla.suse.com/show_bug.cgi?id=1136333

https://bugzilla.suse.com/show_bug.cgi?id=1137325

https://bugzilla.suse.com/show_bug.cgi?id=1141895

https://bugzilla.suse.com/show_bug.cgi?id=1142685

https://bugzilla.suse.com/show_bug.cgi?id=1144333

https://bugzilla.suse.com/show_bug.cgi?id=1145051

https://bugzilla.suse.com/show_bug.cgi?id=1159199

https://bugzilla.suse.com/show_bug.cgi?id=1159285

https://bugzilla.suse.com/show_bug.cgi?id=1160659

https://bugzilla.suse.com/show_bug.cgi?id=1161561

https://bugzilla.suse.com/show_bug.cgi?id=1161702

https://bugzilla.suse.com/show_bug.cgi?id=1161951

https://bugzilla.suse.com/show_bug.cgi?id=1162171

https://bugzilla.suse.com/show_bug.cgi?id=1162929

https://bugzilla.suse.com/show_bug.cgi?id=1162931

https://bugzilla.suse.com/show_bug.cgi?id=1163403

https://bugzilla.suse.com/show_bug.cgi?id=1163508

https://bugzilla.suse.com/show_bug.cgi?id=1163762

https://bugzilla.suse.com/show_bug.cgi?id=1163897

https://bugzilla.suse.com/show_bug.cgi?id=1164078

https://bugzilla.suse.com/show_bug.cgi?id=1164284

https://bugzilla.suse.com/show_bug.cgi?id=1164507

https://bugzilla.suse.com/show_bug.cgi?id=1164777

https://bugzilla.suse.com/show_bug.cgi?id=1164780

https://bugzilla.suse.com/show_bug.cgi?id=1164893

https://bugzilla.suse.com/show_bug.cgi?id=1165019

https://bugzilla.suse.com/show_bug.cgi?id=1165980

https://bugzilla.suse.com/show_bug.cgi?id=1165984

https://bugzilla.suse.com/show_bug.cgi?id=1165985

https://bugzilla.suse.com/show_bug.cgi?id=1166003

https://bugzilla.suse.com/show_bug.cgi?id=1166101

https://bugzilla.suse.com/show_bug.cgi?id=1166102

https://bugzilla.suse.com/show_bug.cgi?id=1166103

https://bugzilla.suse.com/show_bug.cgi?id=1166104

https://bugzilla.suse.com/show_bug.cgi?id=1166632

https://bugzilla.suse.com/show_bug.cgi?id=1166658

https://bugzilla.suse.com/show_bug.cgi?id=1166730

https://bugzilla.suse.com/show_bug.cgi?id=1166731

https://bugzilla.suse.com/show_bug.cgi?id=1166732

https://bugzilla.suse.com/show_bug.cgi?id=1166733

https://bugzilla.suse.com/show_bug.cgi?id=1166734

https://bugzilla.suse.com/show_bug.cgi?id=1166735

https://bugzilla.suse.com/show_bug.cgi?id=1166780

https://bugzilla.suse.com/show_bug.cgi?id=1166860

https://bugzilla.suse.com/show_bug.cgi?id=1166861

https://bugzilla.suse.com/show_bug.cgi?id=1166862

https://bugzilla.suse.com/show_bug.cgi?id=1167629

https://bugzilla.suse.com/show_bug.cgi?id=1168075

https://bugzilla.suse.com/show_bug.cgi?id=1168202

https://bugzilla.suse.com/show_bug.cgi?id=1168273

https://bugzilla.suse.com/show_bug.cgi?id=1168276

https://bugzilla.suse.com/show_bug.cgi?id=1168295

https://bugzilla.suse.com/show_bug.cgi?id=1168367

https://bugzilla.suse.com/show_bug.cgi?id=1168424

https://bugzilla.suse.com/show_bug.cgi?id=1168443

https://bugzilla.suse.com/show_bug.cgi?id=1168486

https://bugzilla.suse.com/show_bug.cgi?id=1168552

https://bugzilla.suse.com/show_bug.cgi?id=1168760

https://bugzilla.suse.com/show_bug.cgi?id=1168762

https://bugzilla.suse.com/show_bug.cgi?id=1168763

https://bugzilla.suse.com/show_bug.cgi?id=1168764

https://bugzilla.suse.com/show_bug.cgi?id=1168765

https://bugzilla.suse.com/show_bug.cgi?id=1168829

https://bugzilla.suse.com/show_bug.cgi?id=1168854

https://bugzilla.suse.com/show_bug.cgi?id=1168881

https://bugzilla.suse.com/show_bug.cgi?id=1168884

https://bugzilla.suse.com/show_bug.cgi?id=1168952

https://bugzilla.suse.com/show_bug.cgi?id=1169013

https://bugzilla.suse.com/show_bug.cgi?id=1169057

https://bugzilla.suse.com/show_bug.cgi?id=1169307

https://bugzilla.suse.com/show_bug.cgi?id=1169308

https://bugzilla.suse.com/show_bug.cgi?id=1169390

https://bugzilla.suse.com/show_bug.cgi?id=1169514

https://bugzilla.suse.com/show_bug.cgi?id=1169625

https://www.suse.com/security/cve/CVE-2018-20836/

https://www.suse.com/security/cve/CVE-2019-19768/

https://www.suse.com/security/cve/CVE-2019-19770/

https://www.suse.com/security/cve/CVE-2019-3701/

https://www.suse.com/security/cve/CVE-2019-9458/

https://www.suse.com/security/cve/CVE-2020-10942/

https://www.suse.com/security/cve/CVE-2020-11494/

https://www.suse.com/security/cve/CVE-2020-11669/

https://www.suse.com/security/cve/CVE-2020-8647/

https://www.suse.com/security/cve/CVE-2020-8649/

https://www.suse.com/security/cve/CVE-2020-8834/

https://www.suse.com/security/cve/CVE-2020-9383/

Plugin Details

Severity: High

ID: 136025

File Name: suse_SU-2020-1118-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 4/28/2020

Updated: 3/14/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-20836

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2019-19770

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-debugsource, p-cpe:/a:novell:suse_linux:kernel-azure-base, p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-azure

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/27/2020

Vulnerability Publication Date: 1/3/2019

Reference Information

CVE: CVE-2018-20836, CVE-2019-19768, CVE-2019-19770, CVE-2019-3701, CVE-2019-9458, CVE-2020-10942, CVE-2020-11494, CVE-2020-11669, CVE-2020-8647, CVE-2020-8649, CVE-2020-8834, CVE-2020-9383