Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3605)

Medium Nessus Plugin ID 102572


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

kernel-uek [4.1.12-94.5.9.el7uek]
- dentry name snapshots (Al Viro) [Orabug: 26630936] {CVE-2017-7533}

- scsi: libiscsi: use kvzalloc for iscsi_pool_init (Kyle Fortin) [Orabug: 26621191]
- mm: introduce kv[mz]alloc helpers (Kyle Fortin) [Orabug: 26621191]
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (David Howells) [Orabug: 26621179] {CVE-2016-9604} {CVE-2016-9604}
- l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind() (Guillaume Nault) [Orabug: 26621176] {CVE-2016-10200}
- mnt: Add a per mount namespace limit on the number of mounts (Eric W. Biederman) [Orabug: 26621171] {CVE-2016-6213} {CVE-2016-6213}
- ipv6: fix out of bound writes in __ip6_append_data() (Eric Dumazet) [Orabug: 26621163] {CVE-2017-9242}


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: Medium

ID: 102572

File Name: oraclelinux_ELSA-2017-3605.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2017/08/18

Modified: 2018/02/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:dtrace-modules-4.1.12-94.5.9.el6uek, p-cpe:/a:oracle:linux:dtrace-modules-4.1.12-94.5.9.el7uek, p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, cpe:/o:oracle:linux:6, cpe:/o:oracle:linux:7

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/08/17

Reference Information

CVE: CVE-2016-10200, CVE-2016-6213, CVE-2016-9604, CVE-2017-7533, CVE-2017-9242

OSVDB: 141527, 153065, 156736, 158171, 162491