Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2011-2029)

Medium Nessus Plugin ID 68422


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

* CVE-2011-2898: Information leak in packet subsystem

Uninitialized struct padding in the packet subsystem led to an information leak of two bytes of kernel memory to userspace.

* CVE-2011-2723: Remote denial of service vulnerability in gro.

The skb_gro_header_slow function in the Linux kernel had a bug which allowed a remote attacker to put certain gro fields in an inconsistent state, resulting in a denial of service.

* CVE-2011-2496: Local denial of service in mremap().

Robert Swiecki discovered that mremap() could be abused for local denial of service by triggering a BUG_ON assert.

* CVE-2011-2484: Denial of service in taskstats subsystem.

The add_del_listener function in kernel/taskstats.c in the Linux kernel did not prevent multiple registrations of exit handlers, which allowed local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.

* CVE-2011-1833: Information disclosure in eCryptfs.

Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested source directory. A local attacker could use this flaw to mount an arbitrary directory, possibly leading to information disclosure.

- af_packet: prevent information leak {CVE-2011-2898}
- gro: Only reset frag0 when skb can be pulled {CVE-2011-2723}
- vm: fix vm_pgoff wrap in upward expansion {CVE-2011-2496}
- taskstats: don't allow duplicate entries in listener mode {CVE-2011-2484}
- Ecryptfs: Add mount option to check uid of device being mounted {CVE-2011-1833}


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: Medium

ID: 68422

File Name: oraclelinux_ELSA-2011-2029.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2013/07/12

Modified: 2015/12/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.7

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, p-cpe:/a:oracle:linux:kernel-uek-headers, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el5uek, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el5uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el6uek, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el6uekdebug, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2011/10/10

Reference Information

CVE: CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-2723, CVE-2011-2898