Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2015-3054)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (Andy
Lutomirski) [Orabug: 21514969] - x86, tls, ldt: Stop checking lm in
LDT_empty (Andy Lutomirski) [Orabug: 21514969]

- KVM: x86: SYSENTER emulation is broken (Nadav Amit) [Orabug:
21502740] {CVE-2015-0239} {CVE-2015-0239}
- x86/tls: Validate TLS entries to protect espfix (Andy Lutomirski)
[Orabug: 20223777] {CVE-2014-8133}
- fs: take i_mutex during prepare_binprm for set[ug]id executables (Jann
Horn) [Orabug: 21502255] {CVE-2015-3339}
- eCryptfs: Remove buggy and unnecessary write in file name decode
routine (Michael Halcrow) [Orabug: 21502066] {CVE-2014-9683}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.2

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 85175 ()

Bugtraq ID:

CVE ID: CVE-2014-8133

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now