Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2015-3055)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

kernel-uek
[2.6.32-400.37.9.el6uek]
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (Andy
Lutomirski) [Orabug: 21518750] - x86, tls, ldt: Stop checking lm in
LDT_empty (Andy Lutomirski) [Orabug: 21518750]

[2.6.32-400.37.8.el6uek]
- KVM: x86: SYSENTER emulation is broken (Nadav Amit) [Orabug:
21502741] {CVE-2015-0239} {CVE-2015-0239}
- x86/tls: Validate TLS entries to protect espfix (Andy Lutomirski)
[Orabug: 20223778] {CVE-2014-8133}
- fs: take i_mutex during prepare_binprm for set[ug]id executables (Jann
Horn) [Orabug: 21502256] {CVE-2015-3339}
- eCryptfs: Remove buggy and unnecessary write in file name decode
routine (Michael Halcrow) [Orabug: 21502067] {CVE-2014-9683}

See also :

https://oss.oracle.com/pipermail/el-errata/2015-August/005277.html
https://oss.oracle.com/pipermail/el-errata/2015-August/005278.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 85176 ()

Bugtraq ID:

CVE ID: CVE-2014-8133
CVE-2014-9683
CVE-2015-0239
CVE-2015-3339

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now