Oracle Linux 5 / 6 : unbreakable enterprise kernel (ELSA-2013-2585)

Medium Nessus Plugin ID 71134


The remote Oracle Linux host is missing one or more security updates.


Description of changes:

kernel-uek [2.6.32-400.33.3.el5uek]
- af_key: fix info leaks in notify messages (Mathias Krause) [Orabug: 17837974] {CVE-2013-2234}
- drivers/cdrom/cdrom.c: use kzalloc() for failing hardware (Jonathan Salwan) [Orabug: 17837971] {CVE-2013-2164}
- fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check (Kees Cook) [Orabug: 17837966] {CVE-2013-1928}
- Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) (Mathias Krause) [Orabug: 17837959] {CVE-2012-6545}
- Bluetooth: RFCOMM - Fix info leak via getsockname() (Mathias Krause) [Orabug: 17838023] {CVE-2012-6545}
- llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Mathias Krause) [Orabug: 17837945] {CVE-2013-3231}
- HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17837942] {CVE-2013-2892}
- HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17837936] {CVE-2013-2889}
- HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17837936] - NFSv4: Check for buffer length in __nfs4_get_acl_uncached (Sven Wegener) [Orabug: 17837931] {CVE-2013-4591}
- ansi_cprng: Fix off by one error in non-block size request (Neil Horman) [Orabug: 17837999] {CVE-2013-4345}
- HID: validate HID report id size (Kees Cook) [Orabug: 17837925] {CVE-2013-2888}
- ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17837923] {CVE-2013-0343}


Update the affected unbreakable enterprise kernel packages.

See Also

Plugin Details

Severity: Medium

ID: 71134

File Name: oraclelinux_ELSA-2013-2585.nasl

Version: $Revision: 1.7 $

Type: local

Agent: unix

Published: 2013/11/29

Modified: 2015/12/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.2

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, p-cpe:/a:oracle:linux:kernel-uek-headers, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.33.3.el5uek, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.33.3.el5uekdebug, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.33.3.el6uek, p-cpe:/a:oracle:linux:mlnx_en-2.6.32-400.33.3.el6uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-400.33.3.el5uek, p-cpe:/a:oracle:linux:ofa-2.6.32-400.33.3.el5uekdebug, p-cpe:/a:oracle:linux:ofa-2.6.32-400.33.3.el6uek, p-cpe:/a:oracle:linux:ofa-2.6.32-400.33.3.el6uekdebug, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/11/28

Reference Information

CVE: CVE-2012-6545, CVE-2013-0343, CVE-2013-1928, CVE-2013-2164, CVE-2013-2234, CVE-2013-2888, CVE-2013-2889, CVE-2013-2892, CVE-2013-3231, CVE-2013-4345, CVE-2013-4591

BID: 58795, 58906, 58991, 59390, 60375, 60874, 62042, 62043, 62049, 62740, 63791