Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2001)

High Nessus Plugin ID 68668

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

* Improved fix for CVE-2010-2962.

The original upstream fix for CVE-2010-2962 had an overflow bug in its bounds checking.

* CVE-2012-0056: Privilege escalation in /proc/[pid]/mem writing.

It was found that permissions were not checked properly in the Linux kernel when handling the /proc/[pid]/mem writing functionality. A local, unprivileged user could use this flaw to escalate their privileges.

- Revert 'proc: enable writing to /proc/pid/mem' [orabug 13619701] {CVE-2012-0056}
- [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha)

- tracing: Fix NULL pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655]

- sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567]
- [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670]
- drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296]
- x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303]
- fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611]
- fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: High

ID: 68668

File Name: oraclelinux_ELSA-2012-2001.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2013/07/12

Updated: 2021/01/14

Dependencies: 12634, 122878

Risk Information

Risk Factor: High

VPR Score: 9

CVSS v2.0

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, p-cpe:/a:oracle:linux:kernel-uek-headers, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.7.1.el6uek, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.7.1.el6uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-300.7.1.el5uek, p-cpe:/a:oracle:linux:ofa-2.6.32-300.7.1.el5uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-300.7.1.el6uek, p-cpe:/a:oracle:linux:ofa-2.6.32-300.7.1.el6uekdebug, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/01/25

Vulnerability Publication Date: 2010/11/26

Exploitable With


Core Impact

Reference Information

CVE: CVE-2010-2962, CVE-2012-0056

BID: 44067, 51625