Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4270)

High Nessus Plugin ID 118861


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

- x86/intel/spectre_v2: Remove unnecessary retp_compiler() test (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814574]
- x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814574]
- x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814574]

- ocfs2: fix ocfs2 read block panic (Junxiao Bi) [Orabug: 28821391]
- scsi: sg: mitigate read/write abuse (Jann Horn) [Orabug: 28824731] {CVE-2017-13168}
- hugetlbfs: introduce truncation/fault mutex to avoid races (Mike Kravetz) [Orabug: 28776542]
- rds: MPRDS messages delivered out of order (Ka-Cheong Poon) [Orabug: 28838051]
- x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: x86_spec_ctrl_set may not disable IBRS on kernel idle (Daniel Jordan) [Orabug: 28270952]
- x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28270952]
- iommu: turn on iommu=pt by default (Tushar Dave) [Orabug: 28111039]
- vhost/scsi: Use common handling code in request queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Extract common handling code from control queue handler (Bijan Mottahedeh) [Orabug: 28775556]
- vhost/scsi: Respond to control queue operations (Bijan Mottahedeh) [Orabug: 28775556]

- Fix error code in nfs_lookup_verify_inode() (Lance Shelton) [Orabug: 28807515]
- x86/speculation: Retpoline should always be available on Skylake (Alexandre Chartre) [Orabug: 28801830]
- x86/bugs: ssbd_ibrs_selected called prematurely (Daniel Jordan) [Orabug: 28802799]
- net/mlx4_core: print firmware version during driver loading (Qing Huang) [Orabug: 28809382]
- hugetlbfs: dirty pages as they are added to pagecache (Mike Kravetz) [Orabug: 28813999]

- infiniband: fix a possible use-after-free bug (Cong Wang) [Orabug: 28774511] {CVE-2018-14734}
- nfs: fix a deadlock in nfs client initialization (Scott Mayhew) [Orabug: 28775910]
- x86/speculation: Unconditionally fill RSB on context switch (Alejandro Jimenez) [Orabug: 28631576] {CVE-2018-15572}
- bnxt_re: Implement the shutdown hook of the L2-RoCE driver interface (Somnath Kotur) [Orabug: 28539344]
- rds: RDS (tcp) hangs on sendto() to unresponding address (Ka-Cheong Poon) [Orabug: 28762597]
- uek-rpm: aarch64 some XGENE drivers must be be modules (Tom Saeger) [Orabug: 28769119]
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (Marc Zyngier) [Orabug: 28762424] {CVE-2018-18021}
- arm64: KVM: Tighten guest core register access from userspace (Dave Martin) [Orabug: 28762424] {CVE-2018-18021}
- iommu/amd: Clear memory encryption mask from physical address (Singh, Brijesh) [Orabug: 28770185]

- mm: get rid of vmacache_flush_all() entirely (Linus Torvalds) [Orabug: 28700955] {CVE-2018-17182}
- Btrfs: fix log replay failure after unlink and link combination (Filipe Manana) [Orabug: 27941939]
- x86/speculation: Add sysfs entry to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Allow IBRS firmware to be enabled when IBRS is disabled (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Remove unnecessary retpoline alternatives (Alexandre Chartre) [Orabug: 28753851]
- x86/speculation: Use static key to enable/disable retpoline (Alexandre Chartre) [Orabug: 28753851]
- bnxt_en: Fix memory fault in bnxt_ethtool_init() (Vasundhara Volam) [Orabug: 28632641]
- IB/core: Initialize relaxed_pd properly (Yuval Shaia) [Orabug: 28197305]

- e1000e: Fix link check race condition (Benjamin Poirier) [Orabug: 28489384]
- Revert 'e1000e: Separate signaling for link check/link up' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Avoid missed interrupts following ICR read (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Fix queue interrupt re-raising in Other interrupt (Benjamin Poirier) [Orabug: 28489384]
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (Benjamin Poirier) [Orabug: 28489384]
- e1000e: Remove Other from EIAC (Benjamin Poirier) [Orabug: 28489384]
- btrfs: validate type when reading a chunk (Gu Jinxiang) [Orabug: 28700851] {CVE-2018-14611}
- btrfs: Check that each block group has corresponding chunk at mount time (Qu Wenruo) [Orabug: 28700872] {CVE-2018-14610}
- net: rds: Use address family to designate IPv4 or IPv6 addresses (H&aring kon Bugge) [Orabug: 28720069]
- net: rds: Fix blank at eol in af_rds.c (H&aring kon Bugge) [Orabug: 28720069]


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: High

ID: 118861

File Name: oraclelinux_ELSA-2018-4270.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2018/11/11

Updated: 2019/09/27

Dependencies: 12634, 122878

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-tools, cpe:/o:oracle:linux:7

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/11/09

Vulnerability Publication Date: 2017/12/06

Reference Information

CVE: CVE-2017-13168, CVE-2018-14610, CVE-2018-14611, CVE-2018-14734, CVE-2018-15572, CVE-2018-17182, CVE-2018-18021