Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2017-3597)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

- selinux: quiet the filesystem labeling behavior message (Paul Moore)
[Orabug: 25721485] - RDS/IB: active bonding port state fix for intfs
added late (Mukesh Kacker) [Orabug: 25875426]
- HID: hid-cypress: validate length of report (Greg Kroah-Hartman)
[Orabug: 25891914] {CVE-2017-7273}
- udf: Remove repeated loads blocksize (Jan Kara) [Orabug: 25905722]
- udf: Check length of extended attributes and allocation descriptors
(Jan Kara) [Orabug: 25905722] {CVE-2015-4167}
- udf: Verify i_size when loading inode (Jan Kara) [Orabug: 25905722]
- btrfs: drop unused parameter from btrfs_item_nr (Ross Kirk) [Orabug:
25948102] {CVE-2014-9710}
- Btrfs: cleanup of function where fixup_low_keys() is called (Tsutomu
Itoh) [Orabug: 25948102] {CVE-2014-9710}
- Btrfs: remove unused argument of fixup_low_keys() (Tsutomu Itoh)
[Orabug: 25948102] {CVE-2014-9710}
- Btrfs: remove unused argument of btrfs_extend_item() (Tsutomu Itoh)
[Orabug: 25948102] {CVE-2014-9710}
- Btrfs: add support for asserts (Josef Bacik) [Orabug: 25948102]
- Btrfs: make xattr replace operations atomic (Filipe Manana) [Orabug:
25948102] {CVE-2014-9710}
- net: validate the range we feed to iov_iter_init() in
sys_sendto/sys_recvfrom (Al Viro) [Orabug: 25948149] {CVE-2015-2686}
- xsigo: Compute node crash on FC failover (Joe Jin) [Orabug: 25965445]
- PCI: Prevent VPD access for QLogic ISP2722 (Ethan Zhao) [Orabug:
- PCI: Prevent VPD access for buggy devices (Babu Moger) [Orabug:
- ipv4: try to cache dst_entries which would cause a redirect (Hannes
Frederic Sowa) [Orabug: 26032377] {CVE-2015-1465}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 5.8
Public Exploit Available : false

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 102061 ()

Bugtraq ID:

CVE ID: CVE-2014-9710

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now