Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2016-3648)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

kernel-uek
[4.1.12-61.1.22.el7uek]
- ocfs2: fix trans extend while free cached blocks (Junxiao Bi)
[Orabug: 25136991]
- ocfs2: fix trans extend while flush truncate log (Junxiao Bi)
[Orabug: 25136991]
- ocfs2: extend enough credits for freeing one truncate record while
replaying truncate records (Xue jiufei) [Orabug: 25136991]
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (Andrey Ryabinin)
[Orabug: 25154096] {CVE-2016-8650} {CVE-2016-8650}
- mlx4: avoid multiple free on id_map_ent (Wengang Wang) [Orabug: 25159035]

[4.1.12-61.1.21.el7uek]
- NVMe: reduce queue depth as workaround for Samsung EPIC SQ errata
(Ashok Vairavan) [Orabug: 25144380]
- sctp: validate chunk len before actually using it (Marcelo Ricardo
Leitner) [Orabug: 25142868] {CVE-2016-9555}

[4.1.12-61.1.20.el7uek]
- rebuild bumping release

See also :

https://oss.oracle.com/pipermail/el-errata/2016-December/006572.html
https://oss.oracle.com/pipermail/el-errata/2016-December/006573.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 95617 ()

Bugtraq ID:

CVE ID: CVE-2016-8650
CVE-2016-9555

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now