Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4510)

high Nessus Plugin ID 121202
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

- ext4: update i_disksize when new eof exceeds it (Shan Hai) [Orabug: 28940828] - ext4: update i_disksize if direct write past ondisk size (Eryu Guan) [Orabug: 28940828] - ext4: protect i_disksize update by i_data_sem in direct write path (Eryu Guan) [Orabug: 28940828] - ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c (Hui Peng) [Orabug: 29042981] {CVE-2018-19824}
- ALSA: usb-audio: Replace probing flag with active refcount (Takashi Iwai) [Orabug: 29042981] {CVE-2018-19824}
- ALSA: usb-audio: Avoid nested autoresume calls (Takashi Iwai) [Orabug: 29042981] {CVE-2018-19824}
- ext4: validate that metadata blocks do not overlap superblock (Theodore Ts'o) [Orabug: 29114440] {CVE-2018-1094}
- ext4: update inline int ext4_has_metadata_csum(struct super_block *sb) (John Donnelly) [Orabug: 29114440] {CVE-2018-1094}
- ext4: always initialize the crc32c checksum driver (Theodore Ts'o) [Orabug: 29114440] {CVE-2018-1094} {CVE-2018-1094}
- Revert 'bnxt_en: Reduce default rings on multi-port cards.' (Brian Maly) [Orabug: 28687746] - mlx4_core: Disable P_Key Violation Traps (H&aring kon Bugge) [Orabug: 27693633] - rds: RDS connection does not reconnect after CQ access violation error (Venkat Venkatsubra) [Orabug: 28733324]

- KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL (KarimAllah Ahmed) [Orabug: 28069548] - KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
- reloaded (Mihai Carabas) [Orabug: 28069548] - KVM/x86: Add IBPB support (Ashok Raj) [Orabug: 28069548] - KVM: x86: pass host_initiated to functions that read MSRs (Paolo Bonzini) [Orabug: 28069548] - KVM: VMX: make MSR bitmaps per-VCPU (Paolo Bonzini) [Orabug: 28069548] - KVM: VMX: introduce alloc_loaded_vmcs (Paolo Bonzini) [Orabug: 28069548] - KVM: nVMX: Eliminate vmcs02 pool (Jim Mattson) [Orabug: 28069548] - KVM: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (Radim Kr&#x10D m&aacute &#x159 ) [Orabug: 28069548] - ocfs2: don't clear bh uptodate for block read (Junxiao Bi) [Orabug: 28762940] - ocfs2: clear journal dirty flag after shutdown journal (Junxiao Bi) [Orabug: 28924775] - ocfs2: fix panic due to unrecovered local alloc (Junxiao Bi) [Orabug: 28924775] - net: rds: fix rds_ib_sysctl_max_recv_allocation error (Zhu Yanjun) [Orabug: 28947481] - x86/speculation: Always disable IBRS in disable_ibrs_and_friends() (Alejandro Jimenez) [Orabug: 29139710]


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: High

ID: 121202

File Name: oraclelinux_ELSA-2019-4510.nasl

Version: 1.8

Type: local

Agent: unix

Published: 1/16/2019

Updated: 2/24/2020

Dependencies: ssh_get_info.nasl, linux_alt_patch_detect.nasl

Risk Information

CVSS Score Source: CVE-2018-19824


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, cpe:/o:oracle:linux:6, cpe:/o:oracle:linux:7

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2019

Vulnerability Publication Date: 4/2/2018

Reference Information

CVE: CVE-2018-1094, CVE-2018-19824