Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2026)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

* CVE-2012-2745: Denial-of-service in kernel key management.

A potential double-free of the replacement session keyring on fork()
could result in a denial-of-service by a local, unprivileged user.

* CVE-2011-1083: Algorithmic denial of service in epoll.

A flaw was found in the way the Linux kernel's Event Poll (epoll)
subsystem handled large, nested epoll structures. A local,
unprivileged user could use this flaw to cause a denial of service.

- epoll: epoll_wait() should not use timespec_add_ns() (Eric Dumazet)
- epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375}
- Don't limit non-nested epoll paths (Jason Baron)
- epoll: kabi fixups for epoll limit wakeup paths (Joe Jin) {CVE-2011-1083}
- epoll: limit paths (Jason Baron) {CVE-2011-1083}
- eventpoll: fix comment typo 'evenpoll' (Paul Bolle)
- epoll: fix compiler warning and optimize the non-blocking path (Shawn
- epoll: move ready event check into proper inline (Davide Libenzi)
- epoll: make epoll_wait() use the hrtimer range feature (Shawn Bohrer)
- select: rename estimate_accuracy() to select_estimate_accuracy()
(Andrew Morton)
- cred: copy_process() should clear child->replacement_session_keyring (Oleg
Nesterov) {CVE-2012-2745}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 4.9
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 68679 ()

Bugtraq ID: 46630

CVE ID: CVE-2011-1083