Oracle Linux 9 : kernel (ELSA-2022-6003)

high Nessus Plugin ID 164032

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2022-6003 advisory.

[5.14.0-70.22.1.0.1_0.OL9] [lockdown: also lock down previous kgdb use (Daniel Thompson) [Orabug: 34290418] {CVE-2022-21499}

[5.14.0-70.22.1_0.OL9] [Update Oracle Linux certificates (Kevin Lyons) [Disable signing for aarch64 (Ilya Okomin) [Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] [Update x509.genkey [Orabug: 24817676] [Conflict with shim-ia32 and shim-x64 < 15.3-1.0.4 [Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]

[5.14.0-70.22.1_0] [PCI: vmd: Revert 2565e5b69c44 ('PCI: vmd: Do not disable MSI-X remapping if interrupt remapping is enabled by IOMMU.') (Myron Stowe) [2109974 2084146] [PCI: vmd: Assign VMD IRQ domain before enumeration (Myron Stowe) [2109974 2084146] [rhel config: Set DMAR_UNITS_SUPPORTED (Jerry Snitselaar) [2105326 2094984] [iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (Jerry Snitselaar) [2105326 2094984]

[5.14.0-70.21.1_0] [ibmvnic: fix race between xmit and reset (Gustavo Walbon) [2103085 2061556] [scsi: core: sysfs: Fix setting device state to SDEV_RUNNING (Chris Leech) [2098251 2095440] [scsi: core: sysfs: Fix hang when device state is set via sysfs (Chris Leech) [2098251 2095440]

[5.14.0-70.20.1_0] [block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern (Ming Lei) [2106024 2066297] {CVE-2022-0494} [ahci: Add a generic 'controller2' RAID id (Tomas Henzl) [2099740 2078880] [ahci: remove duplicated PCI device IDs (Tomas Henzl) [2099740 2042790] [gfs2: Stop using glock holder auto-demotion for now (Andreas Gruenbacher) [2097306 2082193] [gfs2: buffered write prefaulting (Andreas Gruenbacher) [2097306 2082193] [gfs2: Align read and write chunks to the page cache (Andreas Gruenbacher) [2097306 2082193] [gfs2: Pull return value test out of should_fault_in_pages (Andreas Gruenbacher) [2097306 2082193] [gfs2: Clean up use of fault_in_iov_iter_{read,write}able (Andreas Gruenbacher) [2097306 2082193] [gfs2: Variable rename (Andreas Gruenbacher) [2097306 2082193] [gfs2: Fix filesystem block deallocation for short writes (Andreas Gruenbacher) [2097306 2082193] [iomap: iomap_write_end cleanup (Andreas Gruenbacher) [2097306 2082193] [iomap: iomap_write_failed fix (Andreas Gruenbacher) [2097306 2082193] [gfs2: Don't re-check for write past EOF unnecessarily (Andreas Gruenbacher) [2097306 2082193] [gfs2: No short reads or writes upon glock contention (Andreas Gruenbacher) [2097306 2082193] [fs/iomap: Fix buffered write page prefaulting (Andreas Gruenbacher) [2097306 2082193] [gfs2: Make sure not to return short direct writes (Andreas Gruenbacher) [2097306 2082193] [gfs2: Remove dead code in gfs2_file_read_iter (Andreas Gruenbacher) [2097306 2082193] [gfs2: Fix gfs2_file_buffered_write endless loop workaround (Andreas Gruenbacher) [2097306 2082193] [gfs2: Minor retry logic cleanup (Andreas Gruenbacher) [2097306 2082193] [gfs2: Disable page faults during lockless buffered reads (Andreas Gruenbacher) [2097306 2082193] [gfs2: Fix should_fault_in_pages() logic (Andreas Gruenbacher) [2097306 2082193] [gfs2: Initialize gh_error in gfs2_glock_nq (Andreas Gruenbacher) [2097306 2082193] [gfs2: Make use of list_is_first (Andreas Gruenbacher) [2097306 2082193] [gfs2: Switch lock order of inode and iopen glock (Andreas Gruenbacher) [2097306 2082193] [gfs2: cancel timed-out glock requests (Andreas Gruenbacher) [2097306 2082193] [gfs2: Expect -EBUSY after canceling dlm locking requests (Andreas Gruenbacher) [2097306 2082193] [gfs2: gfs2_setattr_size error path fix (Andreas Gruenbacher) [2097306 2082193] [gfs2: assign rgrp glock before compute_bitstructs (Bob Peterson) [2097306 2082193]

[5.14.0-70.19.1_0] [KVM: x86/mmu: make apf token non-zero to fix bug (Vitaly Kuznetsov) [2100903 2074832] [powerpc/64: Move paca allocation later in boot (Desnes A. Nunes do Rosario) [2092248 2055566] [powerpc: Set crashkernel offset to mid of RMA region (Desnes A. Nunes do Rosario) [2092248 2055566] [powerpc/64s/hash: Make hash faults work in NMI context (Desnes A. Nunes do Rosario) [2092253 2062762]

[5.14.0-70.18.1_0] [NFSv4: Fix free of uninitialized nfs4_label on referral lookup. (Benjamin Coddington) [2101858 2086367] [NFSv4 only print the label when its queried (Benjamin Coddington) [2101854 2057327] [crypto: fips - make proc files report fips module name and version (Simo Sorce) [2093384 2080499] [net: sched: fix use-after-free in tc_new_tfilter() (Ivan Vecera) [2071707 2090410] {CVE-2022-1055}

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2022-6003.html

Plugin Details

Severity: High

ID: 164032

File Name: oraclelinux_ELSA-2022-6003.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/10/2022

Updated: 11/2/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2022-0494

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-1055

CVSS v4

Risk Factor: High

Base Score: 8.6

Threat Score: 7.1

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

CVSS Score Source: CVE-2022-1055

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-tools-libs-devel, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel-cross-headers, p-cpe:/a:oracle:linux:kernel-debug-modules, p-cpe:/a:oracle:linux:kernel-tools, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:kernel-headers, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-modules, p-cpe:/a:oracle:linux:kernel-debug-devel-matched, p-cpe:/a:oracle:linux:kernel-abi-stablelists, p-cpe:/a:oracle:linux:kernel-devel-matched, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-core, p-cpe:/a:oracle:linux:kernel-debug-modules-extra, p-cpe:/a:oracle:linux:python3-perf, p-cpe:/a:oracle:linux:bpftool, p-cpe:/a:oracle:linux:kernel-debug-core, p-cpe:/a:oracle:linux:perf, p-cpe:/a:oracle:linux:kernel-modules-extra, p-cpe:/a:oracle:linux:kernel-tools-libs, p-cpe:/a:oracle:linux:kernel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/10/2022

Vulnerability Publication Date: 3/25/2022

Reference Information

CVE: CVE-2022-0494, CVE-2022-1055