Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3508)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

- KEYS: Fix short sprintf buffer in /proc/keys show function (David
Howells) [Orabug: 25306361] {CVE-2016-7042}
- nvme: Limit command retries (Keith Busch) [Orabug: 25374751]
- fs/proc/task_mmu.c: fix mm_access() mode parameter in pagemap_read()
(Kenny Keslar) [Orabug: 25374977]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet)
[Orabug: 25374364] {CVE-2016-6828}
- tunnels: Don't apply GRO to multiple layers of encapsulation. (Jesse
Gross) [Orabug: 25036352] {CVE-2016-8666}
- i40e: Don't notify client(s) for DCB changes on all VSIs (Neerav
Parikh) [Orabug: 25046290]
- packet: fix race condition in packet_set_ring (Philip Pettersson)
[Orabug: 25231617] {CVE-2016-8655}
- netlink: Fix dump skb leak/double free (Herbert Xu) [Orabug:
25231692] {CVE-2016-9806}
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug:
25231720] {CVE-2016-9794}
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet)
[Orabug: 25231751] {CVE-2016-9793}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

High / CVSS Base Score : 7.8
Public Exploit Available : true

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 96477 ()

Bugtraq ID:

CVE ID: CVE-2016-6828

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now