RHEL 8:内核 (RHSA-2020: 0339)

critical Nessus 插件 ID 133480

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2020: 0339 公告中提及的多个漏洞的影响。

- 内核:Marvell Wifi 驱动程序的 mwifiex_set_uap_rates() 函数中的堆溢出可导致 DoS (CVE-2019-14814)

- 内核:Marvell WiFi 驱动程序的 mwifiex_set_wmm_params() 函数中的堆溢出可导致 DoS (CVE-2019-14815)

- 内核:Marvell WiFi 驱动程序的 mwifiex_update_vs_ie() 函数中存在堆溢出 (CVE-2019-14816)

- 内核:在 drivers/net/wireless/marvell/mwifiex/sta_ioctl.c 中,mwifiex_process_country_ie() 函数中存在基于堆的缓冲区溢出 (CVE-2019-14895)

- 内核:未完整修复 CVE-2019-11599 中 mmget_not_zero()/get_task_mm() 和核心转储间的争用条件 (CVE-2019-14898)

- 内核:在 marvell/mwifiex/tdls.c 中的堆溢出 (CVE-2019-14901)

- 内核:Linux 内核的 drivers/net/wireless/realtek/rtlwifi/ps.c 中的 rtl_p2p_noa_ie 缺少特定上界检查,导致缓冲区溢出 (CVE-2019-17666)

- 内核:KVM:将 MSR_IA32_TSX_CTRL 导出到客户机 - TAA 的不完整修复 (CVE-2019-11135) (CVE-2019-19338)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/cve/CVE-2019-14814

https://access.redhat.com/security/cve/CVE-2019-14815

https://access.redhat.com/security/cve/CVE-2019-14816

https://access.redhat.com/security/cve/CVE-2019-14895

https://access.redhat.com/security/cve/CVE-2019-14898

https://access.redhat.com/security/cve/CVE-2019-14901

https://access.redhat.com/security/cve/CVE-2019-17666

https://access.redhat.com/security/cve/CVE-2019-19338

https://access.redhat.com/errata/RHSA-2020:0339

https://bugzilla.redhat.com/1744130

https://bugzilla.redhat.com/1744137

https://bugzilla.redhat.com/1744149

https://bugzilla.redhat.com/1763690

https://bugzilla.redhat.com/1773519

https://bugzilla.redhat.com/1774671

https://bugzilla.redhat.com/1774870

https://bugzilla.redhat.com/1781514

插件详情

严重性: Critical

ID: 133480

文件名: redhat-RHSA-2020-0339.nasl

版本: 1.9

类型: local

代理: unix

发布时间: 2020/2/5

最近更新时间: 2024/3/28

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: Critical

基本分数: 10

时间分数: 7.8

矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2019-14901

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.8

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.2, cpe:/o:redhat:rhel_aus:8.4, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.1, cpe:/o:redhat:rhel_e4s:8.2, cpe:/o:redhat:rhel_e4s:8.4, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.1, cpe:/o:redhat:rhel_eus:8.2, cpe:/o:redhat:rhel_eus:8.4, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.2, cpe:/o:redhat:rhel_tus:8.4, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists, p-cpe:/a:redhat:enterprise_linux:kernel-core, p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:python3-perf

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2020/2/4

漏洞发布日期: 2019/8/29

参考资料信息

CVE: CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14895, CVE-2019-14898, CVE-2019-14901, CVE-2019-17666, CVE-2019-19338

CWE: 120, 122, 203, 362, 385, 400, 667

RHSA: 2020:0339