Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2015-3036)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

- crypto: aesni - fix memory usage in GCM decryption (Stephan Mueller)
[Orabug: 21077389] {CVE-2015-3331}

- xen/pciback: Don't disable PCI_COMMAND on PCI device reset. (Konrad
Rzeszutek Wilk) [Orabug: 20807440] {CVE-2015-2150}
- xen-blkfront: fix accounting of reqs when migrating (Roger Pau Monne)
[Orabug: 20727114] - Revert 'qla2xxx: Ramp down queue depth for
attached SCSI devices when driver resources are low.' (Chad Dupuis)
[Orabug: 20657415] - x86/xen: allow privcmd hypercalls to be preempted
(David Vrabel) [Orabug: 20618759] - sched: Expose
preempt_schedule_irq() (Thomas Gleixner) [Orabug: 20618759] - isofs:
Fix unchecked printing of ER records (Jan Kara) [Orabug: 20930552]
- selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID.
(Stephen Smalley) [Orabug: 20930502] {CVE-2014-3215}
- Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs
(Andy Lutomirski) [Orabug: 20930518] {CVE-2014-3215}
- IB/core: Prevent integer overflow in ib_umem_get address arithmetic
(Shachar Raindel) [Orabug: 20788393] {CVE-2014-8159} {CVE-2014-8159}
- xen-pciback: limit guest control of command register (Jan Beulich)
[Orabug: 20704156] {CVE-2015-2150} {CVE-2015-2150}
- net: sctp: fix slab corruption from use after free on INIT collisions
(Daniel Borkmann) [Orabug: 20780348] {CVE-2015-1421}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 83449 ()

Bugtraq ID: 71883

CVE ID: CVE-2014-3215

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now