Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2011-2029)

medium Nessus Plugin ID 68422
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 4

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

Description of changes:


* CVE-2011-2898: Information leak in packet subsystem

Uninitialized struct padding in the packet subsystem led to an information leak of two bytes of kernel memory to userspace.


* CVE-2011-2723: Remote denial of service vulnerability in gro.

The skb_gro_header_slow function in the Linux kernel had a bug which allowed a remote attacker to put certain gro fields in an inconsistent state, resulting in a denial of service.


* CVE-2011-2496: Local denial of service in mremap().

Robert Swiecki discovered that mremap() could be abused for local denial of service by triggering a BUG_ON assert.


* CVE-2011-2484: Denial of service in taskstats subsystem.

The add_del_listener function in kernel/taskstats.c in the Linux kernel did not prevent multiple registrations of exit handlers, which allowed local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.


* CVE-2011-1833: Information disclosure in eCryptfs.

Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested source directory. A local attacker could use this flaw to mount an arbitrary directory, possibly leading to information disclosure.


[2.6.32-200.20.1.el6uek]
- af_packet: prevent information leak {CVE-2011-2898}
- gro: Only reset frag0 when skb can be pulled {CVE-2011-2723}
- vm: fix vm_pgoff wrap in upward expansion {CVE-2011-2496}
- taskstats: don't allow duplicate entries in listener mode {CVE-2011-2484}
- Ecryptfs: Add mount option to check uid of device being mounted {CVE-2011-1833}

Solution

Update the affected unbreakable enterprise kernel packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2011-October/002394.html

https://oss.oracle.com/pipermail/el-errata/2011-October/002395.html

Plugin Details

Severity: Medium

ID: 68422

File Name: oraclelinux_ELSA-2011-2029.nasl

Version: 1.13

Type: local

Agent: unix

Published: 7/12/2013

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl, linux_alt_patch_detect.nasl

Risk Information

Risk Factor: Medium

VPR Score: 4

CVSS v2.0

Base Score: 5.7

Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, p-cpe:/a:oracle:linux:kernel-uek-headers, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el5uek, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el5uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el6uek, p-cpe:/a:oracle:linux:ofa-2.6.32-200.20.1.el6uekdebug, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 10/10/2011

Vulnerability Publication Date: 6/24/2011

Reference Information

CVE: CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-2723, CVE-2011-2898