SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1605-1)

high Nessus Plugin ID 137617

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed :

CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).

CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).

CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).

CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).

CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).

CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).

CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).

CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).

CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).

CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).

CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).

CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).

CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).

CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).

CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).

CVE-2020-10711: Fixed a NULL pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).

CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).

CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).

CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).

CVE-2019-20806: Fixed a NULL pointer dereference which may had lead to denial of service (bsc#1172199).

CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).

CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).

The update package also includes non-security fixes. See advisory for details.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12-SP4 :

zypper in -t patch SUSE-SLE-WE-12-SP4-2020-1605=1

SUSE Linux Enterprise Software Development Kit 12-SP4 :

zypper in -t patch SUSE-SLE-SDK-12-SP4-2020-1605=1

SUSE Linux Enterprise Server 12-SP4 :

zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-1605=1

SUSE Linux Enterprise Live Patching 12-SP4 :

zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-1605=1

SUSE Linux Enterprise High Availability 12-SP4 :

zypper in -t patch SUSE-SLE-HA-12-SP4-2020-1605=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1051510

https://bugzilla.suse.com/show_bug.cgi?id=1058115

https://bugzilla.suse.com/show_bug.cgi?id=1065729

https://bugzilla.suse.com/show_bug.cgi?id=1071995

https://bugzilla.suse.com/show_bug.cgi?id=1082555

https://bugzilla.suse.com/show_bug.cgi?id=1089895

https://bugzilla.suse.com/show_bug.cgi?id=1167851

https://bugzilla.suse.com/show_bug.cgi?id=1168503

https://bugzilla.suse.com/show_bug.cgi?id=1168670

https://bugzilla.suse.com/show_bug.cgi?id=1169020

https://bugzilla.suse.com/show_bug.cgi?id=1169514

https://bugzilla.suse.com/show_bug.cgi?id=1169525

https://bugzilla.suse.com/show_bug.cgi?id=1170056

https://bugzilla.suse.com/show_bug.cgi?id=1170125

https://bugzilla.suse.com/show_bug.cgi?id=1170145

https://bugzilla.suse.com/show_bug.cgi?id=1170345

https://bugzilla.suse.com/show_bug.cgi?id=1170457

https://bugzilla.suse.com/show_bug.cgi?id=1170522

https://bugzilla.suse.com/show_bug.cgi?id=1170592

https://bugzilla.suse.com/show_bug.cgi?id=1170618

https://bugzilla.suse.com/show_bug.cgi?id=1170620

https://bugzilla.suse.com/show_bug.cgi?id=1170770

https://bugzilla.suse.com/show_bug.cgi?id=1170778

https://bugzilla.suse.com/show_bug.cgi?id=1170791

https://bugzilla.suse.com/show_bug.cgi?id=1170901

https://bugzilla.suse.com/show_bug.cgi?id=1171078

https://bugzilla.suse.com/show_bug.cgi?id=1171098

https://bugzilla.suse.com/show_bug.cgi?id=1171607

https://bugzilla.suse.com/show_bug.cgi?id=1171608

https://bugzilla.suse.com/show_bug.cgi?id=1171609

https://bugzilla.suse.com/show_bug.cgi?id=1171610

https://bugzilla.suse.com/show_bug.cgi?id=1171611

https://bugzilla.suse.com/show_bug.cgi?id=1171612

https://bugzilla.suse.com/show_bug.cgi?id=1171613

https://bugzilla.suse.com/show_bug.cgi?id=1171614

https://bugzilla.suse.com/show_bug.cgi?id=1171615

https://bugzilla.suse.com/show_bug.cgi?id=1171616

https://bugzilla.suse.com/show_bug.cgi?id=1171617

https://bugzilla.suse.com/show_bug.cgi?id=1171618

https://bugzilla.suse.com/show_bug.cgi?id=1171619

https://bugzilla.suse.com/show_bug.cgi?id=1171620

https://bugzilla.suse.com/show_bug.cgi?id=1171621

https://bugzilla.suse.com/show_bug.cgi?id=1171622

https://bugzilla.suse.com/show_bug.cgi?id=1171623

https://bugzilla.suse.com/show_bug.cgi?id=1171624

https://bugzilla.suse.com/show_bug.cgi?id=1171625

https://bugzilla.suse.com/show_bug.cgi?id=1171626

https://bugzilla.suse.com/show_bug.cgi?id=1171679

https://bugzilla.suse.com/show_bug.cgi?id=1171691

https://bugzilla.suse.com/show_bug.cgi?id=1171694

https://bugzilla.suse.com/show_bug.cgi?id=1171695

https://bugzilla.suse.com/show_bug.cgi?id=1171736

https://bugzilla.suse.com/show_bug.cgi?id=1171761

https://bugzilla.suse.com/show_bug.cgi?id=1171948

https://bugzilla.suse.com/show_bug.cgi?id=1171949

https://bugzilla.suse.com/show_bug.cgi?id=1171951

https://bugzilla.suse.com/show_bug.cgi?id=1171952

https://bugzilla.suse.com/show_bug.cgi?id=1171982

https://bugzilla.suse.com/show_bug.cgi?id=1171983

https://bugzilla.suse.com/show_bug.cgi?id=1172096

https://bugzilla.suse.com/show_bug.cgi?id=1172097

https://bugzilla.suse.com/show_bug.cgi?id=1172098

https://bugzilla.suse.com/show_bug.cgi?id=1172099

https://bugzilla.suse.com/show_bug.cgi?id=1172101

https://bugzilla.suse.com/show_bug.cgi?id=1172102

https://bugzilla.suse.com/show_bug.cgi?id=1172103

https://bugzilla.suse.com/show_bug.cgi?id=1172104

https://bugzilla.suse.com/show_bug.cgi?id=1172127

https://bugzilla.suse.com/show_bug.cgi?id=1172130

https://bugzilla.suse.com/show_bug.cgi?id=1172185

https://bugzilla.suse.com/show_bug.cgi?id=1172188

https://bugzilla.suse.com/show_bug.cgi?id=1172199

https://bugzilla.suse.com/show_bug.cgi?id=1172221

https://bugzilla.suse.com/show_bug.cgi?id=1172253

https://bugzilla.suse.com/show_bug.cgi?id=1172317

https://bugzilla.suse.com/show_bug.cgi?id=1172342

https://bugzilla.suse.com/show_bug.cgi?id=1172343

https://bugzilla.suse.com/show_bug.cgi?id=1172344

https://bugzilla.suse.com/show_bug.cgi?id=1172366

https://bugzilla.suse.com/show_bug.cgi?id=1172391

https://bugzilla.suse.com/show_bug.cgi?id=1172397

https://bugzilla.suse.com/show_bug.cgi?id=1172453

https://www.suse.com/security/cve/CVE-2018-1000199/

https://www.suse.com/security/cve/CVE-2019-19462/

https://www.suse.com/security/cve/CVE-2019-20806/

https://www.suse.com/security/cve/CVE-2019-20812/

https://www.suse.com/security/cve/CVE-2019-9455/

https://www.suse.com/security/cve/CVE-2020-0543/

https://www.suse.com/security/cve/CVE-2020-10690/

https://www.suse.com/security/cve/CVE-2020-10711/

https://www.suse.com/security/cve/CVE-2020-10720/

https://www.suse.com/security/cve/CVE-2020-10732/

https://bugzilla.suse.com/show_bug.cgi?id=1111666

https://bugzilla.suse.com/show_bug.cgi?id=1114279

https://bugzilla.suse.com/show_bug.cgi?id=1133021

https://bugzilla.suse.com/show_bug.cgi?id=1144333

https://bugzilla.suse.com/show_bug.cgi?id=1151794

https://bugzilla.suse.com/show_bug.cgi?id=1152489

https://bugzilla.suse.com/show_bug.cgi?id=1154824

https://bugzilla.suse.com/show_bug.cgi?id=1157169

https://bugzilla.suse.com/show_bug.cgi?id=1158265

https://bugzilla.suse.com/show_bug.cgi?id=1160388

https://bugzilla.suse.com/show_bug.cgi?id=1160947

https://bugzilla.suse.com/show_bug.cgi?id=1165183

https://bugzilla.suse.com/show_bug.cgi?id=1165741

https://bugzilla.suse.com/show_bug.cgi?id=1166969

https://bugzilla.suse.com/show_bug.cgi?id=1167574

https://bugzilla.suse.com/show_bug.cgi?id=1171118

https://bugzilla.suse.com/show_bug.cgi?id=1171189

https://bugzilla.suse.com/show_bug.cgi?id=1171191

https://bugzilla.suse.com/show_bug.cgi?id=1171195

https://bugzilla.suse.com/show_bug.cgi?id=1171202

https://bugzilla.suse.com/show_bug.cgi?id=1171205

https://bugzilla.suse.com/show_bug.cgi?id=1171217

https://bugzilla.suse.com/show_bug.cgi?id=1171218

https://bugzilla.suse.com/show_bug.cgi?id=1171219

https://bugzilla.suse.com/show_bug.cgi?id=1171220

https://bugzilla.suse.com/show_bug.cgi?id=1171293

https://bugzilla.suse.com/show_bug.cgi?id=1171417

https://bugzilla.suse.com/show_bug.cgi?id=1171527

https://bugzilla.suse.com/show_bug.cgi?id=1171599

https://bugzilla.suse.com/show_bug.cgi?id=1171600

https://bugzilla.suse.com/show_bug.cgi?id=1171601

https://bugzilla.suse.com/show_bug.cgi?id=1171602

https://bugzilla.suse.com/show_bug.cgi?id=1171604

https://bugzilla.suse.com/show_bug.cgi?id=1171605

https://bugzilla.suse.com/show_bug.cgi?id=1171606

https://www.suse.com/security/cve/CVE-2020-10751/

https://www.suse.com/security/cve/CVE-2020-10757/

https://www.suse.com/security/cve/CVE-2020-12114/

https://www.suse.com/security/cve/CVE-2020-12464/

https://www.suse.com/security/cve/CVE-2020-12652/

https://www.suse.com/security/cve/CVE-2020-12653/

https://www.suse.com/security/cve/CVE-2020-12654/

https://www.suse.com/security/cve/CVE-2020-12655/

https://www.suse.com/security/cve/CVE-2020-12656/

https://www.suse.com/security/cve/CVE-2020-12657/

https://www.suse.com/security/cve/CVE-2020-12768/

https://www.suse.com/security/cve/CVE-2020-12769/

https://www.suse.com/security/cve/CVE-2020-13143/

http://www.nessus.org/u?de301b80

Plugin Details

Severity: High

ID: 137617

File Name: suse_SU-2020-1605-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/18/2020

Updated: 3/6/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-12464

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2020-12657

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-man

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/10/2020

Vulnerability Publication Date: 5/24/2018

Reference Information

CVE: CVE-2018-1000199, CVE-2019-19462, CVE-2019-20806, CVE-2019-20812, CVE-2019-9455, CVE-2020-0543, CVE-2020-10690, CVE-2020-10711, CVE-2020-10720, CVE-2020-10732, CVE-2020-10751, CVE-2020-10757, CVE-2020-12114, CVE-2020-12464, CVE-2020-12652, CVE-2020-12653, CVE-2020-12654, CVE-2020-12655, CVE-2020-12656, CVE-2020-12657, CVE-2020-12768, CVE-2020-12769, CVE-2020-13143