OracleVM 3.4 : Unbreakable / etc (OVMSA-2017-0004)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- KEYS: Fix short sprintf buffer in /proc/keys show
function (David Howells) [Orabug: 25306361]

- nvme: Limit command retries (Keith Busch) [Orabug:

- fs/proc/task_mmu.c: fix mm_access mode parameter in
pagemap_read (Kenny Keslar) [Orabug: 25374977]

- tcp: fix use after free in tcp_xmit_retransmit_queue
(Eric Dumazet) [Orabug: 25374364] (CVE-2016-6828)

- tunnels: Don't apply GRO to multiple layers of
encapsulation. (Jesse Gross) [Orabug: 25036352]

- i40e: Don't notify client(s) for DCB changes on all VSIs
(Neerav Parikh) [Orabug: 25046290]

- packet: fix race condition in packet_set_ring (Philip
Pettersson) [Orabug: 25231617] (CVE-2016-8655)

- netlink: Fix dump skb leak/double free (Herbert Xu)
[Orabug: 25231692] (CVE-2016-9806)

- ALSA: pcm : Call kill_fasync in stream lock (Takashi
Iwai) [Orabug: 25231720] (CVE-2016-9794)

- net: avoid signed overflows for SO_[SND|RCV]BUFFORCE
(Eric Dumazet) [Orabug: 25231751] (CVE-2016-9793)

- rebuild bumping release

See also :

Solution :

Update the affected kernel-uek / kernel-uek-firmware packages.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.4
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 96517 ()

Bugtraq ID:

CVE ID: CVE-2016-6828

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now