SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2021:2647-1)

high Nessus Plugin ID 152480

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED12 / SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2647-1 advisory.

- In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed.
User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:
A-152735806 (CVE-2020-0429)

- An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of- bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. (CVE-2020-36386)

- An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. (CVE-2021-22543)

- A NULL pointer dereference flaw was found in the Linux kernel's IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability. (CVE-2021-3659)

- arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. (CVE-2021-37576)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1113295

https://bugzilla.suse.com/1183871

https://bugzilla.suse.com/1176931

https://www.suse.com/security/cve/CVE-2020-0429

https://bugzilla.suse.com/1181161

https://bugzilla.suse.com/1186672

https://bugzilla.suse.com/1187038

https://www.suse.com/security/cve/CVE-2020-36386

https://bugzilla.suse.com/1186206

https://bugzilla.suse.com/1085224

https://bugzilla.suse.com/1094840

https://bugzilla.suse.com/1184114

https://bugzilla.suse.com/1184804

https://bugzilla.suse.com/1176940

https://bugzilla.suse.com/1188405

https://bugzilla.suse.com/1176724

https://bugzilla.suse.com/1179195

https://bugzilla.suse.com/1184350

https://bugzilla.suse.com/1185377

https://bugzilla.suse.com/1186482

https://bugzilla.suse.com/1186483

https://bugzilla.suse.com/1187476

https://bugzilla.suse.com/1187846

https://bugzilla.suse.com/1188026

https://bugzilla.suse.com/1188101

https://bugzilla.suse.com/1188620

https://bugzilla.suse.com/1188750

https://bugzilla.suse.com/1188838

https://bugzilla.suse.com/1188876

https://bugzilla.suse.com/1188885

https://bugzilla.suse.com/1188973

http://www.nessus.org/u?b6aaca90

https://www.suse.com/security/cve/CVE-2021-22543

https://www.suse.com/security/cve/CVE-2021-3659

https://www.suse.com/security/cve/CVE-2021-37576

Plugin Details

Severity: High

ID: 152480

File Name: suse_SU-2021-2647-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/11/2021

Updated: 7/13/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-37576

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_83-default, p-cpe:/a:novell:suse_linux:kernel-default-man

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/10/2021

Vulnerability Publication Date: 9/17/2020

Reference Information

CVE: CVE-2020-0429, CVE-2020-36386, CVE-2021-22543, CVE-2021-3659, CVE-2021-37576

SuSE: SUSE-SU-2021:2647-1