OracleVM 3.3 : Unbreakable / etc (OVMSA-2016-0139)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- HID: hiddev: validate num_values for HIDIOCGUSAGES,
HIDIOCSUSAGES commands (Scott Bauer) [Orabug: 24798695]
(CVE-2016-5829)

- Revert 'rds: skip rx/tx work when destroying connection'
(Brian Maly) [Orabug: 24790116]

- scsi_sysfs: protect against double execution of
__scsi_remove_device (Vitaly Kuznetsov) [Orabug:
23720563]

- ocfs2: Fix double put of recount tree in
ocfs2_lock_refcount_tree (Ashish Samant) [Orabug:
24691666]

- netfilter: x_tables: speed up jump target validation
(Florian Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: enforce nul-terminated table name
from getsockopt GET_ENTRIES (Pablo Neira Ayuso) [Orabug:
24690304] (CVE-2016-3134)

- netfilter: remove unused comefrom hookmask argument
(Florian Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: introduce and use
xt_copy_counters_from_user (Florian Westphal) [Orabug:
24690304] (CVE-2016-3134)

- netfilter: x_tables: do compat validation via
translate_table (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: x_tables: xt_compat_match_from_user doesn't
need a retval (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: ip6_tables: simplify translate_compat_table
args (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: ip_tables: simplify translate_compat_table
args (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: arp_tables: simplify translate_compat_table
args (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: x_tables: don't reject valid target size on
some architectures (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: x_tables: validate all offsets and sizes in a
rule (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: x_tables: check for bogus target offset
(Florian Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: check standard target size too
(Florian Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: add compat version of
xt_check_entry_offsets (Florian Westphal) [Orabug:
24690304] (CVE-2016-3134)

- netfilter: x_tables: assert minimum target size (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: kill check_entry helper (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: add and use xt_check_entry_offsets
(Florian Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: validate targets of jumps (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: fix unconditional helper (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: validate targets of jumps (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: don't move to non-existent next
rule (Florian Westphal) [Orabug: 24690304]
(CVE-2016-3134)

- netfilter: x_tables: fix unconditional helper (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- netfilter: x_tables: check for size overflow (Florian
Westphal) [Orabug: 24690304] (CVE-2016-3134)

- NFSv4: Fail I/O if the state recovery fails irrevocably
(Trond Myklebust) [Orabug: 24681407]

- rds: skip rx/tx work when destroying connection (Wengang
Wang)

- ocfs2: Fix start offset to ocfs2_zero_range_for_truncate
(Ashish Samant) [Orabug: 23747627]

- sched/core: Clear the root_domain cpumasks in
init_rootdomain (Xunlei Pang) [Orabug: 23518545]

- ocfs2: move dquot_initialize in ocfs2_delete_inode
somewhat later (Jan Kara) [Orabug: 23097098]

- fuse: fix typo while displaying fuse numa mount option
(Ashish Samant)

- IB/mlx4: Replace kfree with kvfree in
mlx4_ib_destroy_srq (Wengang Wang) [Orabug: 22570521]

- ocfs2: return non-zero st_blocks for inline data (John
Haxby)

- watchdog: update watchdog_thresh properly (Michal Hocko)
[Orabug: 21868337]

See also :

http://www.nessus.org/u?de07eae7

Solution :

Update the affected kernel-uek / kernel-uek-firmware packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.5
(CVSS2#E:POC/RL:U/RC:ND)
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 93908 ()

Bugtraq ID:

CVE ID: CVE-2016-3134
CVE-2016-5829

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now