Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2016-3572)

High Nessus Plugin ID 91591

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

Description of changes:

[2.6.39-400.280.1.el6uek]
- Fix cpu bootup stall with large cpu count (Zhenzhong Duan) [Orabug: 23481040]
- megaraid_sas : Update threshold based reply post host index register (<A HREF='https://oss.oracle.com/mailman/listinfo/el-errata'>Sumit.Saxena at avagotech.com</A>) [Orabug: 23536267]

[2.6.39-400.279.1.el6uek]
- IPoIB: increase send queue size to 4 times (Ajaykumar Hotchandani) [Orabug: 22287489]
- IB/ipoib: Change send workqueue size for CM mode (Ajaykumar Hotchandani) [Orabug: 22287489]
- Avoid 60sec timeout when receiving rtpg sense code 06/00/00 (John Sobecki) [Orabug: 22336257]
- stop recursive fault in print_context_stack after stack overflow (John Sobecki) [Orabug: 23174777]
- IB/security: Restrict use of the write() interface (Jason Gunthorpe) [Orabug: 23287131] {CVE-2016-4565}

Solution

Update the affected unbreakable enterprise kernel packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2016-June/006112.html

https://oss.oracle.com/pipermail/el-errata/2016-June/006113.html

Plugin Details

Severity: High

ID: 91591

File Name: oraclelinux_ELSA-2016-3572.nasl

Version: 2.4

Type: local

Agent: unix

Published: 2016/06/14

Updated: 2019/03/25

Dependencies: 12634, 122878

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-firmware, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2016/06/13

Vulnerability Publication Date: 2016/05/23

Reference Information

CVE: CVE-2016-4565