OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0005)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- net: avoid signed overflows for SO_[SND|RCV]BUFFORCE
(Eric Dumazet) [Orabug: 25203623] (CVE-2016-9793)

- nvme: Limit command retries (Ashok Vairavan) [Orabug:
25374794] - tcp: fix use after free in
tcp_xmit_retransmit_queue (Eric Dumazet) [Orabug:
25374371] (CVE-2016-6828)

- logging errors that get masked to EIO inside
drivers/block/loop.c (Manjunath Patil) [Orabug:

- ALSA: pcm : Call kill_fasync in stream lock (Takashi
Iwai) [Orabug: 25203963] (CVE-2016-9794)

- packet: fix race condition in packet_set_ring (Philip
Pettersson) [Orabug: 25217756] (CVE-2016-8655)

- x86: kvmclock: zero initialize pvclock shared memory
area (Igor Mammedov) [Orabug: 25218431]

- KEYS: Fix short sprintf buffer in /proc/keys show
function (David Howells) [Orabug: 25306373]

See also :

Solution :

Update the affected kernel-uek / kernel-uek-firmware packages.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 96518 ()

Bugtraq ID:

CVE ID: CVE-2016-6828

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now