Oracle Linux 5 : ELSA-2016-2124-1: / kernel (ELSA-2016-21241) (deprecated)

high Nessus Plugin ID 181110

Synopsis

This plugin has been deprecated.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2016-21241 advisory.

- Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka Dirty COW. (CVE-2016-5195)

- The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling. (CVE-2016-1583)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

This plugin has been deprecated as it is a duplicate of oraclelinux_ELSA-2016-2124-1.nasl (plugin ID 94428).

See Also

https://linux.oracle.com/errata/ELSA-2016-2124-1.html

Plugin Details

Severity: High

ID: 181110

File Name: oraclelinux_ELSA-2016-21241.nasl

Version: 1.3

Type: local

Agent: unix

Published: 9/7/2023

Updated: 10/6/2023

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-5195

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-xen, p-cpe:/a:oracle:linux:oracleasm-2.6.18-416.0.0.0.1.el5, p-cpe:/a:oracle:linux:ocfs2-2.6.18-416.0.0.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-416.0.0.0.1.el5debug, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-416.0.0.0.1.el5debug, p-cpe:/a:oracle:linux:oracleasm-2.6.18-416.0.0.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:ocfs2-2.6.18-416.0.0.0.1.el5pae, p-cpe:/a:oracle:linux:ocfs2-2.6.18-416.0.0.0.1.el5, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-416.0.0.0.1.el5pae, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel

Required KB Items: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/28/2016

Vulnerability Publication Date: 6/13/2016

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2016-1583, CVE-2016-5195

IAVA: 2016-A-0306-S