Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2013-2534)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:


[2.6.32-400.29.1.el6uek]
- KVM: add missing void __user COPYING CREDITS Documentation Kbuild
MAINTAINERS Makefile README REPORTING-BUGS arch block crypto drivers
firmware fs include init ipc kernel lib mm net samples scripts security
sound tools uek-rpm usr virt cast to access_ok() call (Heiko Carstens)
[Orabug: 16941620] {CVE-2013-1943}
- KVM: Validate userspace_addr of memslot when registered (Takuya
Yoshikawa) [Orabug: 16941620] {CVE-2013-1943}

[2.6.32-400.28.1.el6uek]
- do_add_mount()/umount -l races (Jerry Snitselaar) [Orabug: 16311974]
- tg3: fix length overflow in VPD firmware parsing (Kees Cook) [Orabug:
16837019] {CVE-2013-1929}
- USB: cdc-wdm: fix buffer overflow (Oliver Neukum) [Orabug: 16837003]
{CVE-2013-1860}
- bonding: emit event when bonding changes MAC (Weiping Pan) [Orabug:
16579025]
- sched: Fix ancient race in do_exit() (Joe Jin)
- open debug in page_move_anon_rmap by default. (Xiaowei.Hu) [Orabug:
14046035]
- block: default SCSI command filter does not accomodate commands
overlap across device classes (Jamie Iles) [Orabug: 16387136]
{CVE-2012-4542}
- vma_adjust: fix the copying of anon_vma chains (Linus Torvalds)
[Orabug: 14046035]
- xen-netfront: delay gARP until backend switches to Connected (Laszlo
Ersek) [Orabug: 16182568]
- svcrpc: don't hold sv_lock over svc_xprt_put() (J. Bruce Fields)
[Orabug: 16032824]
- mm/hotplug: correctly add new zone to all other nodes' zone lists
(Jiang Liu) [Orabug: 16603569] {CVE-2012-5517}
- ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread (Oleg
Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()
(Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}
- Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson
Lizardo) [Orabug: 16711062] {CVE-2013-0349}
- dccp: check ccid before dereferencing (Mathias Krause) [Orabug:
16711040] {CVE-2013-1827}
- USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch)
[Orabug: 16425435] {CVE-2013-1774}
- keys: fix race with concurrent install_user_keyrings() (David Howells)
[Orabug: 16493369] {CVE-2013-1792}
- KVM: Fix bounds checking in ioapic indirect register reads
(CVE-2013-1798) (Andy Honig) [Orabug: 16710937] {CVE-2013-1798}
- KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME
(CVE-2013-1796) (Jerry Snitselaar) [Orabug: 16710794] {CVE-2013-1796}

[2.6.32-400.27.1.el6uek]
- net/tun: fix ioctl() based info leaks (Mathias Krause) [Orabug:
16675501] {CVE-2012-6547}
- atm: fix info leak via getsockname() (Mathias Krause) [Orabug:
16675501] {CVE-2012-6546}
- atm: fix info leak in getsockopt(SO_ATMPVC) (Mathias Krause) [Orabug:
16675501] {CVE-2012-6546}
- xfrm_user: fix info leak in copy_to_user_tmpl() (Mathias Krause)
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_policy() (Mathias Krause)
[Orabug: 16675501] {CVE-2012-6537}
- xfrm_user: fix info leak in copy_to_user_state() (Mathias Krause)
[Orabug: 16675501] {CVE-2013-6537}
- xfrm_user: return error pointer instead of NULL #2 (Mathias Krause)
[Orabug: 16675501] {CVE-2013-1826}
- xfrm_user: return error pointer instead of NULL (Mathias Krause)
[Orabug: 16675501] {CVE-2013-1826}
- llc: fix info leak via getsockname() (Mathias Krause) [Orabug:
16675501] {CVE-2012-6542}
- x86/mm: Check if PUD is large when validating a kernel address (Mel
Gorman) [Orabug: 14251997]

See also :

https://oss.oracle.com/pipermail/el-errata/2013-June/003512.html
https://oss.oracle.com/pipermail/el-errata/2013-June/003513.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true