Lucene search

K

Oracle: Security Advisory (ELSA-2013-1801)

πŸ—“οΈΒ 06 Oct 2015Β 00:00:00Reported byΒ Copyright (C) 2015 Greenbone AGTypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 31Β Views

Oracle: Security Advisory (ELSA-2013-1801) - Missing update for 'kernel' package(s)

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
CentOS Update for kernel CESA-2013:1801 centos6
17 Dec 201300:00
–openvas
OpenVAS
RedHat Update for kernel RHSA-2013:1801-01
17 Dec 201300:00
–openvas
OpenVAS
RedHat Update for kernel RHSA-2013:1801-01
17 Dec 201300:00
–openvas
OpenVAS
CentOS Update for kernel CESA-2013:1801 centos6
17 Dec 201300:00
–openvas
OpenVAS
Oracle: Security Advisory (ELSA-2013-2589)
6 Oct 201500:00
–openvas
OpenVAS
Oracle: Security Advisory (ELSA-2013-2587)
6 Oct 201500:00
–openvas
OpenVAS
CentOS Update for kmod-kvm CESA-2014:0163 centos5
17 Feb 201400:00
–openvas
OpenVAS
CentOS Update for kmod-kvm CESA-2014:0163 centos5
17 Feb 201400:00
–openvas
OpenVAS
Oracle: Security Advisory (ELSA-2013-2588)
6 Oct 201500:00
–openvas
OpenVAS
Fedora Update for kernel FEDORA-2014-0696
3 Feb 201400:00
–openvas
Rows per page
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.123497");
  script_cve_id("CVE-2013-2141", "CVE-2013-4470", "CVE-2013-6367", "CVE-2013-6368");
  script_tag(name:"creation_date", value:"2015-10-06 11:04:39 +0000 (Tue, 06 Oct 2015)");
  script_version("2025-01-23T05:37:38+0000");
  script_tag(name:"last_modification", value:"2025-01-23 05:37:38 +0000 (Thu, 23 Jan 2025)");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:C/A:C");

  script_name("Oracle: Security Advisory (ELSA-2013-1801)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2015 Greenbone AG");
  script_family("Oracle Linux Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/oracle_linux", "ssh/login/release", re:"ssh/login/release=OracleLinux6");

  script_xref(name:"Advisory-ID", value:"ELSA-2013-1801");
  script_xref(name:"URL", value:"https://linux.oracle.com/errata/ELSA-2013-1801.html");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2013-1801 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"[2.6.32-431.1.2]
- [x86] kvm: fix cross page vapic_addr access (Paolo Bonzini) [1032214 1032215] {CVE-2013-6368}
- [x86] kvm: fix division by zero in apic_get_tmcct (Paolo Bonzini) [1032212 1032213] {CVE-2013-6367}

[2.6.32-431.1.1]
- [netdrv] mlx4_en: Check device state when setting coalescing (Amir Vadai) [1032395 975908]
- [net] ip_output: do skb ufo init for peeked non ufo skb as well (Jiri Pirko) [1023490 1023491] {CVE-2013-4470}
- [net] ip6_output: do skb ufo init for peeked non ufo skb as well (Jiri Pirko) [1023490 1023491] {CVE-2013-4470}
- [net] sunrpc: Fix a data corruption issue when retransmitting RPC calls (Jeff Layton) [1032424 1030046]
- [fs] gfs2: Implement a rgrp has no extents longer than X scheme (Robert S Peterson) [1032162 998625]
- [fs] gfs2: Drop inadequate rgrps from the reservation tree (Robert S Peterson) [1032162 998625]
- [fs] gfs2: If requested is too large, use the largest extent in the rgrp (Robert S Peterson) [1032162 998625]
- [fs] gfs2: Add allocation parameters structure (Robert S Peterson) [1032162 998625]
- [fs] nfs: Don't check lock owner compatibility unless file is locked - part 2 (Jeff Layton) [1032260 1007039]
- [fs] nfs: Don't check lock owner compatibility in writes unless file is locked (Jeff Layton) [1032260 1007039]
- [netdrv] ixgbevf: move API neg to reset path (Andy Gospodarek) [1032168 1019346]
- [netdrv] ixgbe: fix inconsistent clearing of the multicast table (Andy Gospodarek) [1032170 975248]
- [mm] Group e820 entries together and add map_individual_e820 boot option (Larry Woodman) [1020518 876275]
- [mm] Exclude E820_RESERVED regions and memory holes above 4 GB from direct mapping (Larry Woodman) [1020518 876275]
- [mm] Find_early_table_space based on ranges that are actually being mapped (Larry Woodman) [1020518 876275]
- [fs] nfs: Fix the sync mount option for nfs4 mounts (Scott Mayhew) [1030171 915862]
- [fs] nfsv4: Missing Chunk of Back Port Patch Causes Hang (Steve Dickson) [1032250 1024006]
- [fs] xfs: Ensure sync updates the log tail correctly (Dave Chinner) [1032249 1025439]
- [fs] xfs: only update the last_sync_lsn when a transaction completes (Dave Chinner) [1032249 1025439]
- [fs] xfs: prevent deadlock trying to cover an active log (Dave Chinner) [1032688 1014867]
- [kernel] signal: stop info leak via the tkill and the tgkill syscalls (Petr Holasek) [970876 970878] {CVE-2013-2141}
- [block] rsxx: Disallow discards from being unmapped (Steve Best) [1028278 1023897]
- [netdrv] brcmsmac: Module alias support missing from backport (John Green) [1029330 1020461]
- [netdrv] mlx4_en: Fix pages never dma unmapped on rx (Steve Best) [1027343 1023272]
- [netdrv] mlx4_en: Fix BlueFlame race (Amir Vadai) [1029997 987634]
- [scsi] lpfc 8.3.42: Fixed failure to allocate SCSI buffer on PPC64 platform for SLI4 devices (Rob Evers) [1030713 1024683]
- [scsi] Revert: qla2xxx: Ramp down queue depth for attached SCSI devices ... [Please see the references for more information on the vulnerabilities]");

  script_tag(name:"affected", value:"'kernel' package(s) on Oracle Linux 6.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "OracleLinux6") {

  if(!isnull(res = isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-abi-whitelists", rpm:"kernel-abi-whitelists~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"perf", rpm:"perf~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python-perf", rpm:"python-perf~2.6.32~431.1.2.el6", rls:"OracleLinux6"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
06 Oct 2015 00:00Current
7.3High risk
Vulners AI Score7.3
CVSS26.9
EPSS0.003
31
.json
Report