Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3104)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

[2.6.39-400.215.14.el5uek]
- HID: magicmouse: sanity check report size in raw_event() callback
(Jiri Kosina) [Orabug: 19849355] {CVE-2014-3181}
- ALSA: control: Protect user controls against concurrent access
(Lars-Peter Clausen) [Orabug: 20192542] {CVE-2014-4652}
- target/rd: Refactor rd_build_device_space + rd_release_device_space
(Nicholas Bellinger) [Orabug: 20192517] {CVE-2014-4027}
- media-device: fix infoleak in ioctl media_enum_entities() (Salva
Peir&oacute ) [Orabug: 20192501] {CVE-2014-1739} {CVE-2014-1739}
- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara)
[Orabug: 20192449] {CVE-2014-6410}
- ALSA: control: Make sure that id->index does not overflow (Lars-Peter
Clausen) [Orabug: 20192418] {CVE-2014-4656}
- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug:
20192376] {CVE-2014-465}
- HID: picolcd: sanity check report size in raw_event() callback (Jiri
Kosina) [Orabug: 20192205] {CVE-2014-3186}
- net: sctp: fix remote memory pressure from excessive queueing (Daniel
Borkmann) [Orabug: 20192059] {CVE-2014-3688}

See also :

https://oss.oracle.com/pipermail/el-errata/2014-December/004717.html
https://oss.oracle.com/pipermail/el-errata/2014-December/004719.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now