Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2013-2543)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

[2.6.39-400.109.6.el5uek]
- block: do not pass disk names as format strings (Kees Cook) [Orabug:
17230083] {CVE-2013-2851}
- libceph: Fix NULL pointer dereference in auth client code (Tyler
Hicks) [Orabug: 17230108] {CVE-2013-1059}
- ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Eric Dumazet)
[Orabug: 17371078] {CVE-2013-2232}
- af_key: initialize satype in key_notify_policy_flush() (Nicolas
Dichtel) [Orabug: 17370788] {CVE-2013-2237}
- Bluetooth: HCI - Fix info leak via getsockname() (Mathias Krause)
[Orabug: 17370892] {CVE-2012-6544}
- Bluetooth: L2CAP - Fix info leak via getsockname() (Mathias Krause)
[Orabug: 17371050] {CVE-2012-6544}
- Bluetooth: HCI - Fix info leak in getsockopt(HCI_FILTER) (Mathias
Krause) [Orabug: 17371065] {CVE-2012-6544}
- sctp: Use correct sideffect command in duplicate cookie handling (Vlad
Yasevich) [Orabug: 17371118] {CVE-2013-2206}
- sctp: deal with multiple COOKIE_ECHO chunks (Max Matveev) [Orabug:
17372121] {CVE-2013-2206}

See also :

https://oss.oracle.com/pipermail/el-errata/2013-August/003647.html
https://oss.oracle.com/pipermail/el-errata/2013-August/003646.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 69510 ()

Bugtraq ID: 58990
60409
60715
60893
60922
60953

CVE ID: CVE-2012-6544
CVE-2013-1059
CVE-2013-2206
CVE-2013-2232
CVE-2013-2237
CVE-2013-2851