Scientific Linux Security Update : kernel on SL7.x x86_64 (20190314)

high Nessus Plugin ID 122887


The remote Scientific Linux host is missing one or more security updates.


Security Fix(es) :

- kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568)

- kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)

- kernel: Faulty computation of numberic bounds in the BPF verifier (CVE-2018-18445)

Bug Fix(es) and Enhancement(s) :

- kernel fuse invalidates cached attributes during reads

- [NetApp-FC-NVMe] SL7.6: nvme reset gets hung indefinitely

- Memory reclaim deadlock calling __sock_create() after memalloc_noio_save()

- hardened usercopy is causing crash

- Backport: xfrm: policy: init locks early

- AWS m5 instance type loses NVMe mounted volumes [was:
Unable to Mount StatefulSet PV in AWS EBS]

- SL 7.6 running on a VirtualBox guest with a GUI has a mouse problem

- Kernel bug report in cgroups on heavily contested 3.10 node

- [PCIe] SHPC probe crash on Non-ACPI/Non-SHPC ports

- [Cavium 7.7 Feat] qla2xxx: Update to latest upstream.

- Regression in lpfc and the CNE1000 (BE2 FCoE) adapters that no longer initialize

- [csiostor] call trace after command: modprobe csiostor

- libceph: fall back to sendmsg for slab pages

- Deadlock between stop_one_cpu_nowait() and stop_two_cpus()

- Soft lockups occur when the sd driver passes a device size of 1 sector to string_get_size()

- [SL7.7] BUG: unable to handle kernel paging request at ffffffffffffffff

- SL7.6 - powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM)

- blk-mq: fix corruption with direct issue

- [SL7][patch] iscsi driver can block reboot/shutdown

- [DELL EMC 7.6 BUG] Unable to create-namespace over Dell NVDIMM-N

- efi_bgrt_init fails to ioremap error during boot

- Unable to mount a share on kernel- 3.10.0-957.el7. The share can be mounted on kernel-3.10.0-862.14.4.el7

- System crash with RIP nfs_readpage_async+0x43 -- BUG:
unable to handle kernel NULL pointer dereference


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 122887

File Name: sl_20190314_kernel_on_SL7_x.nasl

Version: 1.3

Type: local

Agent: unix

Published: 3/18/2019

Updated: 2/24/2020

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:bpftool, p-cpe:/a:fermilab:scientific_linux:kernel, p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists, p-cpe:/a:fermilab:scientific_linux:kernel-debug, p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo, p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel, p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo, p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64, p-cpe:/a:fermilab:scientific_linux:kernel-devel, p-cpe:/a:fermilab:scientific_linux:kernel-doc, p-cpe:/a:fermilab:scientific_linux:kernel-headers, p-cpe:/a:fermilab:scientific_linux:kernel-tools, p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo, p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs, p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel, p-cpe:/a:fermilab:scientific_linux:perf, p-cpe:/a:fermilab:scientific_linux:perf-debuginfo, p-cpe:/a:fermilab:scientific_linux:python-perf, p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/14/2019

Vulnerability Publication Date: 10/3/2018

Reference Information

CVE: CVE-2018-17972, CVE-2018-18445, CVE-2018-9568