OracleVM 2.1 : kernel (OVMSA-2008-2005)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- fix utrace dead_engine ops race

- fix ptrace_attach leak

- CVE-2007-5093: kernel PWC driver DoS

- CVE-2007-6282: IPSec ESP kernel panics

- CVE-2007-6712: kernel: infinite loop in highres timers
(kernel hang)

- CVE-2008-1615: kernel: ptrace: Unprivileged crash on
x86_64 %cs corruption

- CVE-2008-1294: kernel: setrlimit(RLIMIT_CPUINFO) with
zero value doesn't inherit properly across children

- CVE-2008-2136: kernel: sit memory leak

- CVE-2008-2812: kernel: NULL ptr dereference in multiple
network drivers due to missing checks in tty code

- restore
linux-2.6-x86-clear-df-flag-for-signal-handlers.patch

- restore linux-2.6-utrace.patch /
linux-2.6-xen-utrace.patch

- Kernel security erratas for OVM 2.1.2 from bz#5932 :

- CVE-2007-6063: isdn: fix possible isdn_net buffer
overflows

- CVE-2007-3104 Null pointer to an inode in a dentry can
cause an oops in sysfs_readdir

- CVE-2008-0598: write system call vulnerability

- CVE-2008-1375: kernel: race condition in dnotify

- CVE-2008-0001: kernel: filesystem corruption by
unprivileged user via directory truncation

- CVE-2008-2358: dccp: sanity check feature length

- CVE-2007-5938: NULL dereference in iwl driver

- RHSA-2008:0508: kernel: [x86_64] The string instruction
version didn't zero the output on exception.

- kernel: clear df flag for signal handlers

- fs: missing dput in do_lookup error leaks dentries

- sysfs: fix condition check in sysfs_drop_dentry

- sysfs: fix race condition around sd->s_dentry

- ieee80211: off-by-two integer underflow

See also :

http://www.nessus.org/u?97ce6a60

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now