The remote OracleVM system is missing necessary patches to address critical security updates :
ocfs2: protect extent tree in ocfs2_prepare_inode_for_write (Shuning Zhang) [Orabug:
30036349]
ocfs2: direct-IO: protect get_blocks (Junxiao Bi) [Orabug: 30036349]
SUNRPC: Remove xprt_connect_status (Trond Myklebust) [Orabug: 30165838]
SUNRPC: Handle ENETDOWN errors (Trond Myklebust) [Orabug: 30165838]
vhost: make sure log_num < in_num (yongduan) [Orabug:
30312787] (CVE-2019-14835)
vhost: block speculation of translated descriptors (Michael S. Tsirkin) [Orabug: 30312787] (CVE-2019-14835)
vhost: Fix Spectre V1 vulnerability (Jason Wang) [Orabug: 30312787]
array_index_nospec: Sanitize speculative array de-references (Dan Williams) [Orabug: 30312787]
net: hsr: fix memory leak in hsr_dev_finalize (Mao Wenan) [Orabug: 30444853] (CVE-2019-16995)
ieee802154: enforce CAP_NET_RAW for raw sockets (Ori Nimron) [Orabug: 30444946] (CVE-2019-17053)
mISDN: enforce CAP_NET_RAW for raw sockets (Ori Nimron) [Orabug: 30445158] (CVE-2019-17055)
net: sit: fix memory leak in sit_init_net (Mao Wenan) [Orabug: 30445305] (CVE-2019-16994)
media: dvb: usb: fix use after free in dvb_usb_device_exit (Oliver Neukum) [Orabug: 30490491] (CVE-2019-15213)
media: cpia2_usb: first wake up, then free in disconnect (Oliver Neukum) [Orabug: 30511741] (CVE-2019-15215)
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap (Vandana BN) [Orabug: 30532774] (CVE-2019-15217)
target: Propagate backend read-only to core_tpg_add_lun (Nicholas Bellinger) [Orabug: 30538419]
kvm: mmu: ITLB_MULTIHIT mitigation selection (Kanth Ghatraju) [Orabug: 30539766]
cpu/speculation: Uninline and export CPU mitigations helpers (Kanth Ghatraju) [Orabug: 30539766]
rds: Use correct conn when dropping connections due to cancel (Hå kon Bugge) [Orabug: 30316058]
rds: ib: Optimize rds_ib_laddr_check (Hå kon Bugge) [Orabug: 30327671]
rds: Bring loop-back peer down as well (Hå kon Bugge) [Orabug: 30271704]
rds: ib: Avoid connect retry on loopback connections (Hå kon Bugge)
rds: ib: Qualify CM REQ duplicate detection with connection being up (Hå kon Bugge) [Orabug:
30062150]
rds: Further prioritize local loop-back connections (Hå kon Bugge)
rds: Fix initial zero delay when queuing re-connect work (Hå kon Bugge)
rds: Re-introduce separate work-queue for local connections (Hå kon Bugge) [Orabug: 30062150]
rds: Re-factor and avoid superfluous queuing of shutdown work (Hå kon Bugge) [Orabug: 29994551]
rds: ib: Flush ARP cache when connection attempt is rejected (Hå kon Bugge) [Orabug: 29994550]
rds: ib: Fix incorrect setting of cp_reconnect_racing (Hå kon Bugge)
RDMA/cma: Make # CM retries configurable (Hå kon Bugge) [Orabug: 29994555]
rds: Re-factor and avoid superfluous queuing of reconnect work (Hå kon Bugge) [Orabug: 29994558]
rds: ib: Correct the cm_id compare commit (Hå kon Bugge) [Orabug: 29994560]
rds: Increase entropy in hashing (Hå kon Bugge) [Orabug: 29994561]
rds: ib: Resurrect the CQs instead of delete+create (Hå kon Bugge)
rds: Avoid queuing superfluous send and recv work (Hå kon Bugge)
x86/tsx: Add config options to set tsx=on|off|auto (Michal Hocko) [Orabug: 30517133] (CVE-2019-11135)
x86/speculation/taa: Add documentation for TSX Async Abort (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
x86/tsx: Add ‘auto’ option to the tsx= cmdline parameter (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
x86/speculation/taa: Add mitigation for TSX Async Abort (Kanth Ghatraju) [Orabug: 30517133] (CVE-2019-11135)
x86/cpu: Add a ‘tsx=’ cmdline option with TSX disabled by default (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
x86/cpu: Add a helper function x86_read_arch_cap_msr (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
kvm: x86: mmu: Recovery of shattered NX large pages (Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
kvm: Add helper function for creating VM worker threads (Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [Orabug: 30517059] (CVE-2018-12207)
kvm: x86: Do not release the page inside mmu_set_spte (Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
x86/cpu: Add Tremont to the cpu vulnerability whitelist (Pawan Gupta) [Orabug: 30517059] (CVE-2018-12207)
x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Move mapping_level_dirty_bitmap call in mapping_level (Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
Revert ‘KVM: x86: use the fast way to invalidate all pages’ (Sean Christopherson) [Orabug: 30517059] (CVE-2018-12207)
kvm: Convert kvm_lock to a mutex (Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Simplify force_pt_level calculation code in FNAME(page_fault) (Takuya Yoshikawa) [Orabug:
30517059] (CVE-2018-12207)
KVM: x86: MMU: Make force_pt_level bool (Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page (Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: extend usage of RET_MMIO_PF_* constants (Paolo Bonzini) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Make mmu_set_spte return emulate value (Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Move parent_pte handling from kvm_mmu_get_page to link_shadow_page (Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
KVM: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page (Takuya Yoshikawa) [Orabug:
30517059] (CVE-2018-12207)
scsi: qla2xxx: Fix NULL pointer crash due to probe failure [Orabug: 30161119]
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (Jeremy Compostella) [Orabug: 30210503] (CVE-2017-18551)
scsi: qla2xxx: Ability to process multiple SGEs in Command SGL for CT passthrough commands. (Giridhar Malavali) [Orabug: 30256423]
net-sysfs: Fix mem leak in netdev_register_kobject (YueHaibing) [Orabug: 30350263] (CVE-2019-15916)
Drivers: hv: vmbus: add special crash handler (Vitaly Kuznetsov)
#
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from OracleVM
# Security Advisory OVMSA-2019-0056.
#
include('compat.inc');
if (description)
{
script_id(131208);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/10");
script_cve_id(
"CVE-2017-18551",
"CVE-2018-12207",
"CVE-2019-11135",
"CVE-2019-14835",
"CVE-2019-15213",
"CVE-2019-15215",
"CVE-2019-15217",
"CVE-2019-15916",
"CVE-2019-16994",
"CVE-2019-16995",
"CVE-2019-17053",
"CVE-2019-17055"
);
script_name(english:"OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0056)");
script_set_attribute(attribute:"synopsis", value:
"The remote OracleVM host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote OracleVM system is missing necessary patches to address
critical security updates :
- ocfs2: protect extent tree in
ocfs2_prepare_inode_for_write (Shuning Zhang) [Orabug:
30036349]
- ocfs2: direct-IO: protect get_blocks (Junxiao Bi)
[Orabug: 30036349]
- SUNRPC: Remove xprt_connect_status (Trond Myklebust)
[Orabug: 30165838]
- SUNRPC: Handle ENETDOWN errors (Trond Myklebust)
[Orabug: 30165838]
- vhost: make sure log_num < in_num (yongduan) [Orabug:
30312787] (CVE-2019-14835)
- vhost: block speculation of translated descriptors
(Michael S. Tsirkin) [Orabug: 30312787] (CVE-2019-14835)
- vhost: Fix Spectre V1 vulnerability (Jason Wang)
[Orabug: 30312787]
- array_index_nospec: Sanitize speculative array
de-references (Dan Williams) [Orabug: 30312787]
- net: hsr: fix memory leak in hsr_dev_finalize (Mao
Wenan) [Orabug: 30444853] (CVE-2019-16995)
- ieee802154: enforce CAP_NET_RAW for raw sockets (Ori
Nimron) [Orabug: 30444946] (CVE-2019-17053)
- mISDN: enforce CAP_NET_RAW for raw sockets (Ori Nimron)
[Orabug: 30445158] (CVE-2019-17055)
- net: sit: fix memory leak in sit_init_net (Mao Wenan)
[Orabug: 30445305] (CVE-2019-16994)
- media: dvb: usb: fix use after free in
dvb_usb_device_exit (Oliver Neukum) [Orabug: 30490491]
(CVE-2019-15213)
- media: cpia2_usb: first wake up, then free in disconnect
(Oliver Neukum) [Orabug: 30511741] (CVE-2019-15215)
- media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in
zr364xx_vidioc_querycap (Vandana BN) [Orabug: 30532774]
(CVE-2019-15217)
- target: Propagate backend read-only to core_tpg_add_lun
(Nicholas Bellinger) [Orabug: 30538419]
- kvm: mmu: ITLB_MULTIHIT mitigation selection (Kanth
Ghatraju) [Orabug: 30539766]
- cpu/speculation: Uninline and export CPU mitigations
helpers (Kanth Ghatraju) [Orabug: 30539766]
- rds: Use correct conn when dropping connections due to
cancel (Hå kon Bugge) [Orabug: 30316058]
- rds: ib: Optimize rds_ib_laddr_check (Hå kon Bugge)
[Orabug: 30327671]
- rds: Bring loop-back peer down as well (Hå kon
Bugge) [Orabug: 30271704]
- rds: ib: Avoid connect retry on loopback connections
(Hå kon Bugge)
- rds: ib: Qualify CM REQ duplicate detection with
connection being up (Hå kon Bugge) [Orabug:
30062150]
- rds: Further prioritize local loop-back connections
(Hå kon Bugge)
- rds: Fix initial zero delay when queuing re-connect work
(Hå kon Bugge)
- rds: Re-introduce separate work-queue for local
connections (Hå kon Bugge) [Orabug: 30062150]
- rds: Re-factor and avoid superfluous queuing of shutdown
work (Hå kon Bugge) [Orabug: 29994551]
- rds: ib: Flush ARP cache when connection attempt is
rejected (Hå kon Bugge) [Orabug: 29994550]
- rds: ib: Fix incorrect setting of cp_reconnect_racing
(Hå kon Bugge)
- RDMA/cma: Make # CM retries configurable (Hå kon
Bugge) [Orabug: 29994555]
- rds: Re-factor and avoid superfluous queuing of
reconnect work (Hå kon Bugge) [Orabug: 29994558]
- rds: ib: Correct the cm_id compare commit (Hå kon
Bugge) [Orabug: 29994560]
- rds: Increase entropy in hashing (Hå kon Bugge)
[Orabug: 29994561]
- rds: ib: Resurrect the CQs instead of delete+create
(Hå kon Bugge)
- rds: Avoid queuing superfluous send and recv work
(Hå kon Bugge)
- x86/tsx: Add config options to set tsx=on|off|auto
(Michal Hocko) [Orabug: 30517133] (CVE-2019-11135)
- x86/speculation/taa: Add documentation for TSX Async
Abort (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
- x86/tsx: Add 'auto' option to the tsx= cmdline parameter
(Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
- kvm/x86: Export MDS_NO=0 to guests when TSX is enabled
(Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
- x86/speculation/taa: Add sysfs reporting for TSX Async
Abort (Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
- x86/speculation/taa: Add mitigation for TSX Async Abort
(Kanth Ghatraju) [Orabug: 30517133] (CVE-2019-11135)
- x86/cpu: Add a 'tsx=' cmdline option with TSX disabled
by default (Pawan Gupta) [Orabug: 30517133]
(CVE-2019-11135)
- x86/cpu: Add a helper function x86_read_arch_cap_msr
(Pawan Gupta) [Orabug: 30517133] (CVE-2019-11135)
- x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta)
[Orabug: 30517133] (CVE-2019-11135)
- kvm: x86: mmu: Recovery of shattered NX large pages
(Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
- kvm: Add helper function for creating VM worker threads
(Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
- kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini)
[Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: remove now unneeded hugepage gfn adjustment
(Paolo Bonzini) [Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: make FNAME(fetch) and __direct_map more
similar (Paolo Bonzini) [Orabug: 30517059]
(CVE-2018-12207)
- kvm: x86: Do not release the page inside mmu_set_spte
(Junaid Shahid) [Orabug: 30517059] (CVE-2018-12207)
- x86/cpu: Add Tremont to the cpu vulnerability whitelist
(Pawan Gupta) [Orabug: 30517059] (CVE-2018-12207)
- x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta)
[Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Move mapping_level_dirty_bitmap call in
mapping_level (Takuya Yoshikawa) [Orabug: 30517059]
(CVE-2018-12207)
- Revert 'KVM: x86: use the fast way to invalidate all
pages' (Sean Christopherson) [Orabug: 30517059]
(CVE-2018-12207)
- kvm: Convert kvm_lock to a mutex (Junaid Shahid)
[Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Simplify force_pt_level calculation code
in FNAME(page_fault) (Takuya Yoshikawa) [Orabug:
30517059] (CVE-2018-12207)
- KVM: x86: MMU: Make force_pt_level bool (Takuya
Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Remove unused parameter parent_pte from
kvm_mmu_get_page (Takuya Yoshikawa) [Orabug: 30517059]
(CVE-2018-12207)
- KVM: x86: extend usage of RET_MMIO_PF_* constants (Paolo
Bonzini) [Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Make mmu_set_spte return emulate value
(Takuya Yoshikawa) [Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Move parent_pte handling from
kvm_mmu_get_page to link_shadow_page (Takuya Yoshikawa)
[Orabug: 30517059] (CVE-2018-12207)
- KVM: x86: MMU: Move initialization of parent_ptes out
from kvm_mmu_alloc_page (Takuya Yoshikawa) [Orabug:
30517059] (CVE-2018-12207)
- scsi: qla2xxx: Fix NULL pointer crash due to probe
failure [Orabug: 30161119]
- i2c: core-smbus: prevent stack corruption on read
I2C_BLOCK_DATA (Jeremy Compostella) [Orabug: 30210503]
(CVE-2017-18551)
- scsi: qla2xxx: Ability to process multiple SGEs in
Command SGL for CT passthrough commands. (Giridhar
Malavali) [Orabug: 30256423]
- net-sysfs: Fix mem leak in netdev_register_kobject
(YueHaibing) [Orabug: 30350263] (CVE-2019-15916)
- Drivers: hv: vmbus: add special crash handler (Vitaly
Kuznetsov)");
# https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000968.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c252002b");
script_set_attribute(attribute:"solution", value:
"Update the affected kernel-uek / kernel-uek-firmware packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-14835");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/19");
script_set_attribute(attribute:"patch_publication_date", value:"2019/11/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/22");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:kernel-uek");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:kernel-uek-firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:3.4");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"OracleVM Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/OracleVM/release");
if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
if (! preg(pattern:"^OVS" + "3\.4" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 3.4", "OracleVM " + release);
if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);
if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
flag = 0;
if (rpm_check(release:"OVS3.4", reference:"kernel-uek-4.1.12-124.33.4.el6uek")) flag++;
if (rpm_check(release:"OVS3.4", reference:"kernel-uek-firmware-4.1.12-124.33.4.el6uek")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel-uek / kernel-uek-firmware");
}
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | vm | kernel-uek | p-cpe:/a:oracle:vm:kernel-uek |
oracle | vm | kernel-uek-firmware | p-cpe:/a:oracle:vm:kernel-uek-firmware |
oracle | vm_server | 3.4 | cpe:/o:oracle:vm_server:3.4 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
www.nessus.org/u?c252002b