Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2038)

High Nessus Plugin ID 68683

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

Description of changes:

kernel-uek [2.6.32-300.37.1.el6uek]
- sfc: Replace some literal constants with EFX_PAGE_SIZE/EFX_BUF_SIZE (Ben Hutchings) [Orabug: 14769994]
- CVE-2012-3412 sfc: Fix maximum number of TSO segments and minimum TX queue size (Ben Hutchings) [Orabug: 14769994] {CVE-2012-3412}

[2.6.32-300.36.1.el6uek]
- dl2k: Clean up rio_ioctl (Stephan Mueller) [Orabug: 14675306] {CVE-2012-2313}
- hugetlb: fix resv_map leak in error path (Christoph Lameter) [Orabug: 14676403] {CVE-2012-2390}
- rds: set correct msg_namelen (Jay Fenlason) [Orabug: 14676504] {CVE-2012-3430}

[2.6.32-300.35.1.el6uek]
- oracleasm: Bring driver in sync with UEK2 (Martin K. Petersen)
- Fix system hang due to bad protection module parameters (CR 130769) (Martin K. Petersen)
- sd: Avoid remapping bad reference tags (Martin K. Petersen)
- block: Fix bad range check in bio_sector_offset (Martin K. Petersen)

[2.6.32-300.34.1.el6uek]
- htrimer: fix kabi breakage (Joe Jin)
- 2.6.32.x: timekeeping: Add missing update call in timekeeping_resume() (Thomas Gleixner)
- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt (John Stultz)
- 2.6.32.x: timekeeping: Provide hrtimer update function (Thomas Gleixner)
- 2.6.32.x: hrtimers: Move lock held region in hrtimer_interrupt() (Thomas Gleixner)
- 2.6.32.x: timekeeping: Maintain ktime_t based offsets for hrtimers (Thomas Gleixner)
- 2.6.32.x: timekeeping: Fix leapsecond triggered load spike issue (John Stultz)
- 2.6.32.x: hrtimer: Provide clock_was_set_delayed() (John Stultz)
- 2.6.32.x: time: Move common updates to a function (Thomas Gleixner)
- 2.6.32.x: timekeeping: Fix CLOCK_MONOTONIC inconsistency during leapsecond (John Stultz)
- 2.6.32.x: ntp: Correct TAI offset during leap second (Richard Cochran)
- 2.6.32.x: ntp: Fix leap-second hrtimer livelock (John Stultz)
- Revert '2.6.32.x: hrtimer: Fix clock_was_set so it is safe to call from irq context' (Joe Jin)
- Revert '2.6.32.x: time: Fix leapsecond triggered hrtimer/futex load spike issue' (Joe Jin)
- Revert '2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt' (Joe Jin)

[2.6.32-300.33.1.el6uek]
- mpt2sas: Update mpt2sas to 120.105.11.00 (Guru Anbalagane) [Orabug: 14376481]
- Revert 'mpt2sas: update to 12.105.11.00' (Maxim Uvarov)

Solution

Update the affected unbreakable enterprise kernel packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2012-October/003086.html

https://oss.oracle.com/pipermail/el-errata/2012-October/003090.html

Plugin Details

Severity: High

ID: 68683

File Name: oraclelinux_ELSA-2012-2038.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2013/07/12

Updated: 2019/09/30

Dependencies: 122878, 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, p-cpe:/a:oracle:linux:kernel-uek-headers, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.37.1.el5uek, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.37.1.el5uekdebug, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.37.1.el6uek, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-300.37.1.el6uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-300.37.1.el5uek, p-cpe:/a:oracle:linux:ofa-2.6.32-300.37.1.el5uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-300.37.1.el6uek, p-cpe:/a:oracle:linux:ofa-2.6.32-300.37.1.el6uekdebug, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/10/19

Vulnerability Publication Date: 2012/06/13

Reference Information

CVE: CVE-2012-2313, CVE-2012-2390, CVE-2012-3412, CVE-2012-3430

BID: 53668, 53965, 54702, 54763