Oracle Linux 6 / 7 : kernel-uek (ELSA-2016-3587)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

[4.1.12-37.6.1.el7uek]
- vfs: rename: check backing inode being equal (Miklos Szeredi)
[Orabug: 24010060] {CVE-2016-6198} {CVE-2016-6197}
- vfs: add vfs_select_inode() helper (Miklos Szeredi) [Orabug:
24010060] {CVE-2016-6198} {CVE-2016-6197}
- ovl: verify upper dentry before unlink and rename (Miklos Szeredi)
[Orabug: 24010060] {CVE-2016-6198} {CVE-2016-6197}
- ovl: fix getcwd() failure after unsuccessful rmdir (Rui Wang)
[Orabug: 24010060] {CVE-2016-6198} {CVE-2016-6197}
- xen: use same main loop for counting and remapping pages (Juergen
Gross) [Orabug: 24012238]
- Revert 'ocfs2: bump up o2cb network protocol version' (Junxiao Bi)
[Orabug: 23710417]
- atl2: Disable unimplemented scatter/gather feature (Ben Hutchings)
[Orabug: 23704078] {CVE-2016-2117}
- Revert 'perf tools: Bump default sample freq to 4 kHz'
(ashok.vairavan) [Orabug: 23634802]
- block: Initialize max_dev_sectors to 0 (Keith Busch) [Orabug: 23333444]
- sd: Fix rw_max for devices that report an optimal xfer size (Martin K.
Petersen) [Orabug: 23333444]
- sd: Fix excessive capacity printing on devices with blocks bigger than
512 bytes (Martin K. Petersen) [Orabug: 23333444]
- sd: Optimal I/O size is in bytes, not sectors (Martin K. Petersen)
[Orabug: 23333444]
- sd: Reject optimal transfer length smaller than page size (Martin K.
Petersen) [Orabug: 23333444]
- Fix kabi issue for upstream commit ca369d51 (Joe Jin) [Orabug: 23333444]
- block/sd: Fix device-imposed transfer length limits (Joe Jin)
[Orabug: 23333444]

See also :

https://oss.oracle.com/pipermail/el-errata/2016-July/006214.html
https://oss.oracle.com/pipermail/el-errata/2016-July/006215.html

Solution :

Update the affected kernel-uek packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 92656 ()

Bugtraq ID:

CVE ID: CVE-2016-2117
CVE-2016-6197
CVE-2016-6198

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now