Oracle Linux 5 : kernel (ELSA-2012-0150)

medium Nessus Plugin ID 68468

Synopsis

The remote Oracle Linux host is missing a security update.

Description

The remote Oracle Linux 5 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2012-0150 advisory.

- [fs] jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen) [783284] {CVE-2011-4086}
- [fs] epoll: workarounds to preserve kernel ABI (Jason Baron) [681692] {CVE-2011-1083}
- [fs] epoll: limit paths (Jason Baron) [681692] {CVE-2011-1083}
- [fs] epoll: prevent creating circular epoll structures (Jason Baron) [681692] {CVE-2011-1083}
- [fs] epoll: add ep_call_nested() (Jason Baron) [681692] {CVE-2011-1083}
- [misc] Move exit_robust_list to mm_release, null lists on cleanup (Laszlo Ersek) [750283] {CVE-2012-0028}
- [fs] nfs: Fix an O_DIRECT Oops (Jeff Layton) [754620] {CVE-2011-4325}
- [scsi] sd: fix 32-on-64 block device ioctls (Paolo Bonzini) [752386] {CVE-2011-4127}
- [md] dm: do not forward ioctls from LVs to the underlying devices (Paolo Bonzini) [752386] {CVE-2011-4127}
- [block] fail SCSI passthrough ioctls on partition devices (Paolo Bonzini) [752386] {CVE-2011-4127}
- [block] add and use scsi_blk_cmd_ioctl (Paolo Bonzini) [752386] {CVE-2011-4127}
- [fs] ext4: fix BUG_ON() in ext4_ext_insert_extent() (Lukas Czerner) [747946] {CVE-2011-3638}
- [fs] xfs: Fix memory corruption in xfs_readlink (Carlos Maiolino) [749160] {CVE-2011-4077}
- [fs] hfs: add sanity check for file name length (Eric Sandeen) [755433] {CVE-2011-4330}
- [security] keys: Fix NULL deref in user-defined key type (David Howells) [751301] {CVE-2011-4110}
- [fs] proc: fix oops on invalid /proc/<pid>/maps access (Johannes Weiner) [747699] {CVE-2011-3637}
- [misc] remove div_long_long_rem (Prarit Bhargava) [732614] {CVE-2011-3209}
- [net] bridge: fix use after free in __br_deliver (Amerigo Wang) [703045] {CVE-2011-2942}
- [fs] proc: close race with exec in mem_read() (Johannes Weiner) [692042] {CVE-2011-1020}
- [mm] implement access_remote_vm (Johannes Weiner) [692042] {CVE-2011-1020}
- [mm] factor out main logic of access_process_vm (Johannes Weiner) [692042] {CVE-2011-1020}
- [mm] use mm_struct to resolve gate vma's in __get_user_pages (Johannes Weiner) [692042] {CVE-2011-1020}
- [mm] make in_gate_area take mm_struct instead of a task_struct (Johannes Weiner) [692042] {CVE-2011-1020}
- [mm] make get_gate_vma take mm_struct instead of task_struct (Johannes Weiner) [692042] {CVE-2011-1020}
- [x86_64] mark assoc mm when running task in 32 bit compat mode (Johannes Weiner) [692042] {CVE-2011-1020}
- [misc] sched: add ctx tag to mm running task in ia32 compat mode (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] proc: require the target to be tracable (or yourself) (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] proc: close race in /proc/*/environ (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] proc: report errors in /proc/*/*map* sanely (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] proc: shift down_read(mmap_sem) to the caller (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] detect exec transition phase with new mm but old creds (Johannes Weiner) [692042] {CVE-2011-1020}
- [fs] cifs: always do is_path_accessible check in cifs_mount (Jeff Layton) [738300] {CVE-2011-3363}
- [fs] cifs: add fallback in is_path_accessible for old servers (Jeff Layton) [738300] {CVE-2011-3363}
- [char] tpm: Zero buffer after copying to userspace (Jiri Benc) [732631] {CVE-2011-1162}
- [misc] kernel: plug taskstats io infoleak (Jerome Marchand) [716846] {CVE-2011-2494}
- [mm] avoid wrapping vm_pgoff in mremap and stack expansion (Jerome Marchand) [716544] {CVE-2011-2496}
- [fs] ecryptfs: Add mount option to check uid of mounting device (Eric Sandeen) [731174] {CVE-2011-1833}
- [misc] taskstats: don't allow duplicate entries in listener mode (Jerome Marchand) [715450] {CVE-2011-2484}
- [net] gro: Only reset frag0 when skb can be pulled (Herbert Xu) [679682] {CVE-2011-2723}
- [net] sctp: fix memory reclaim and panic in sctp_sock_rfree (Thomas Graf) [714870] {CVE-2011-2482}
- [xen] iommu: disable bus-mastering on hw that causes IOMMU fault (Laszlo Ersek) [730343] {CVE-2011-3131}
- [xen] x86_emulate: Fix SAHF emulation (Igor Mammedov) [718884] {CVE-2011-2519}
- [xen] fix off-by-one shift in x86_64 __addr_ok (Laszlo Ersek) [719850] {CVE-2011-2901}
- [usb] auerswald: fix buffer overflow (Don Zickus) [722396] {CVE-2009-4067}
- [char] tpm: Fix uninitialized usage of data buffer (Stanislaw Gruszka) [684673] {CVE-2011-1160}
- [fs] ext4: Fix max size and logical block counting of extent file (Lukas Czerner) [722563] {CVE-2011-2695}
- [wireless] nl80211: check for valid SSID size in scan operation (Stanislaw Gruszka) [718155] {CVE-2011-2517}
- [fs] proc: restrict access to /proc/PID/io (Oleg Nesterov) [716828] {CVE-2011-2495}
- [net] sunrpc: Don't hang forever on NLM unlock requests (Jeff Layton) [709547] {CVE-2011-2491}

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2012-0150.html

Plugin Details

Severity: Medium

ID: 68468

File Name: oraclelinux_ELSA-2012-0150.nasl

Version: 1.14

Type: local

Agent: unix

Published: 7/12/2013

Updated: 11/1/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2011-1083

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:oracleasm-2.6.18-308.el5, p-cpe:/a:oracle:linux:kernel-xen, cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-308.el5xen, p-cpe:/a:oracle:linux:kernel-pae-devel, p-cpe:/a:oracle:linux:ocfs2-2.6.18-308.el5debug, p-cpe:/a:oracle:linux:kernel-xen-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-308.el5pae, p-cpe:/a:oracle:linux:kernel-pae, p-cpe:/a:oracle:linux:oracleasm-2.6.18-308.el5xen, p-cpe:/a:oracle:linux:ocfs2-2.6.18-308.el5, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:oracleasm-2.6.18-308.el5debug, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:ocfs2-2.6.18-308.el5pae, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/7/2012

Vulnerability Publication Date: 4/4/2011

Reference Information

CVE: CVE-2011-1083

BID: 46630

RHSA: 2012:0150