Oracle Linux 5 : kernel (ELSA-2011-1386)

critical Nessus Plugin ID 68375

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2011-1386 advisory.

- Revert: [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716301 716302] {CVE-2011-1898}
- [net] bridge: fix use after free in __br_deliver (Amerigo Wang) [730949 703045] {CVE-2011-2942}
- [misc] remove div_long_long_rem (Prarit Bhargava) [732879 732614] {CVE-2011-3209}
- [net] be2net: fix crash receiving non-member VLAN packets (Ivan Vecera) [736430 730239] {CVE-2011-3347}
- [net] be2net: Use NTWK_RX_FILTER command for promiscous mode (Ivan Vecera) [736430 730239] {CVE-2011-3347}
- [net] be2net: non-member vlan pkts not received in promisc mode (Ivan Vecera) [736430 730239] {CVE-2011-3347}
- [net] be2net: remove bogus unlikely on vlan check (Ivan Vecera) [736430 730239] {CVE-2011-3347}
- [net] Compute protocol seq numbers and fragment IDs using MD5 (Jiri Pirko) [732662 732663] {CVE-2011-3188}
- [crypto] Move md5_transform to lib/md5.c (Jiri Pirko) [732662 732663] {CVE-2011-3188}
- [mm] avoid wrapping vm_pgoff in mremap and stack expansion (Jerome Marchand) [716543 716544] {CVE-2011-2496}
- [fs] ecryptfs: Add mount option to check uid of mounting device (Eric Sandeen) [731173 731174] {CVE-2011-1833}
- [net] ipv6: make fragment identifications less predictable (Jiri Pirko) [723430 723431] {CVE-2011-2699}
- [net] ipv6: Remove unused skb argument of ipv6_select_ident (Jiri Pirko) [723430 723431] {CVE-2011-2699}
- [misc] taskstats: don't allow duplicate entries in listener mode (Jerome Marchand) [715449 715450] {CVE-2011-2484}
- [net] gro: Only reset frag0 when skb can be pulled (Herbert Xu) [726553 679682] {CVE-2011-2723}
- [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716301 716302] {CVE-2011-1898}
- [xen] iommu: disable bus-mastering on hw that causes IOMMU fault (Laszlo Ersek) [730342 730343] {CVE-2011-3131}
- [usb] auerswald: fix buffer overflow (Don Zickus) [722395 722396] {CVE-2009-4067}
- [fs] cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton) [732870 736654 732869 732471] {CVE-2011-3191}
- [fs] cifs: revert special handling for matching krb5 sessions (Jeff Layton) [697395 697396] {CVE-2011-1585}
- [fs] cifs: check for NULL session password (Jeff Layton) [697395 697396] {CVE-2011-1585}
- [fs] cifs: fix NULL pointer dereference in cifs_find_smb_ses (Jeff Layton) [697395 697396] {CVE-2011-1585}
- [fs] cifs: clean up cifs_find_smb_ses (Jeff Layton) [697395 697396] {CVE-2011-1585}
- [char] tpm: Fix uninitialized usage of data buffer (Stanislaw Gruszka) [684672 684673] {CVE-2011-1160}
- [fs] ext4: Fix max size and logical block counting of extent file (Lukas Czerner) [722562 722563] {CVE-2011-2695}

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2011-1386.html

Plugin Details

Severity: Critical

ID: 68375

File Name: oraclelinux_ELSA-2011-1386.nasl

Version: 1.17

Type: local

Agent: unix

Published: 7/12/2013

Updated: 11/1/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-3191

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2011-3188

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-xen, p-cpe:/a:oracle:linux:oracleasm-2.6.18-274.7.1.0.1.el5pae, cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-274.7.1.0.1.el5, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:ocfs2-2.6.18-274.7.1.0.1.el5debug, p-cpe:/a:oracle:linux:ocfs2-2.6.18-274.7.1.0.1.el5xen, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-274.7.1.0.1.el5, p-cpe:/a:oracle:linux:ocfs2-2.6.18-274.7.1.0.1.el5pae, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:oracleasm-2.6.18-274.7.1.0.1.el5xen, p-cpe:/a:oracle:linux:oracleasm-2.6.18-274.7.1.0.1.el5debug, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/24/2011

Vulnerability Publication Date: 6/24/2011

Reference Information

CVE: CVE-2009-4067, CVE-2011-1160, CVE-2011-1585, CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-2695, CVE-2011-2699, CVE-2011-2723, CVE-2011-2942, CVE-2011-3131, CVE-2011-3188, CVE-2011-3191, CVE-2011-3209, CVE-2011-3347

BID: 50311, 50312, 50313, 46866, 47321, 47381, 48383, 48687, 48697, 48802, 48929, 49108, 49146, 49289, 49295

RHSA: 2011:1386