Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2009)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

Following Security bug are fixed in this errata

When copying data to userspace, the RDS protocol failed to verify that
the user-provided address was a valid
userspace address. A local unprivileged user could issue specially
crafted socket calls to write arbitrary
values into kernel memory and potentially escalate privileges to root.

Integer overflow in the do_io_submit function in fs/aio.c in the Linux
kernel before 2.6.36-rc4-next-20100915
allows local users to cause a denial of service or possibly have
unspecified other impact via crafted use of
the io_submit system call.

The tcf_act_police_dump function in net/sched/act_police.c in the
actions implementation in the network queueing
functionality in the Linux kernel before 2.6.36-rc4 does not properly
initialize certain structure members, which
allows local users to obtain potentially sensitive information from
kernel memory via vectors involving a dump
operation. NOTE: this vulnerability exists because of an incomplete fix
for CVE-2010-2942.


- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}
- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch
- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch
- [aio]


- Fix rds permissions checks during copies

- Update to BXOFED 1.5.1-1.3.6-5

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
Public Exploit Available : true

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 68173 ()

Bugtraq ID:

CVE ID: CVE-2010-2942