Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2017-3509)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

Description of changes:

- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet)
[Orabug: 25203623] {CVE-2016-9793}

- nvme: Limit command retries (Ashok Vairavan) [Orabug: 25374794]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet)
[Orabug: 25374371] {CVE-2016-6828}
- logging errors that get masked to EIO inside drivers/block/loop.c
(Manjunath Patil) [Orabug: 22505535]
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug:
25203963] {CVE-2016-9794}
- packet: fix race condition in packet_set_ring (Philip Pettersson)
[Orabug: 25217756] {CVE-2016-8655}
- x86: kvmclock: zero initialize pvclock shared memory area (Igor
Mammedov) [Orabug: 25218431]
- KEYS: Fix short sprintf buffer in /proc/keys show function (David
Howells) [Orabug: 25306373] {CVE-2016-7042}

See also :

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

High / CVSS Base Score : 7.2
Public Exploit Available : true

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 96478 ()

Bugtraq ID:

CVE ID: CVE-2016-6828

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now