OracleVM 3.2 : Unbreakable / etc (OVMSA-2017-0106)

Critical Nessus Plugin ID 100238


The remote OracleVM host is missing one or more security updates.


The remote OracleVM system is missing necessary patches to address critical security updates :

- nfsd: stricter decoding of write-like NFSv2/v3 ops (J.
Bruce Fields) [Orabug: 25986995] (CVE-2017-7895)

- ocfs2/o2net: o2net_listen_data_ready should do nothing if socket state is not TCP_LISTEN (Tariq Saeed) [Orabug:

- IB/CORE: sync the resouce access in fmr_pool (Wengang Wang) [Orabug: 23750748]

- ipv6: Skip XFRM lookup if dst_entry in socket cache is valid (Jakub Sitnicki) [Orabug: 25534688]

- uek-rpm: enable CONFIG_KSPLICE. (Jamie Iles) [Orabug:

- ksplice: add sysctls for determining Ksplice features.
(Jamie Iles)

- signal: protect SIGNAL_UNKILLABLE from unintentional clearing. (Jamie Iles) [Orabug: 25549845]

- KVM: x86: fix emulation of 'MOV SS, null selector' (Paolo Bonzini) [Orabug: 25719676] (CVE-2017-2583) (CVE-2017-2583)

- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Marcelo Ricardo Leitner) [Orabug: 25719811] (CVE-2017-5986)

- tcp: avoid infinite loop in tcp_splice_read (Eric Dumazet) [Orabug: 25720815] (CVE-2017-6214)

- USB: visor: fix null-deref at probe (Johan Hovold) [Orabug: 25796604] (CVE-2016-2782)

- ipc/shm: Fix shmat mmap nil-page protection (Davidlohr Bueso) [Orabug: 25797014] (CVE-2017-5669)

- vhost: actually track log eventfd file (Marc-Andr&eacute Lureau) [Orabug: 25797056] (CVE-2015-6252)

- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder (Andy Whitcroft) [Orabug: 25814664] (CVE-2017-7184)

- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window (Andy Whitcroft) [Orabug: 25814664] (CVE-2017-7184)

- KEYS: Remove key_type::match in favour of overriding default by match_preparse (David Howells) [Orabug:
25823965] (CVE-2017-2647) (CVE-2017-2647)

- USB: whiteheat: fix potential null-deref at probe (Johan Hovold) [Orabug: 25825107] (CVE-2015-5257)

- RDS: fix race condition when sending a message on unbound socket (Quentin Casasnovas) [Orabug: 25871048] (CVE-2015-6937) (CVE-2015-6937)

- udf: Check path length when reading symlink (Jan Kara) [Orabug: 25871104] (CVE-2015-9731)

- udf: Treat symlink component of type 2 as / (Jan Kara) [Orabug: 25871104] (CVE-2015-9731)

- udp: properly support MSG_PEEK with truncated buffers (Eric Dumazet) [Orabug: 25874741] (CVE-2016-10229)

- block: fix use-after-free in seq file (Vegard Nossum) [Orabug: 25877531] (CVE-2016-7910)

- RHEL: complement upstream workaround for CVE-2016-10142.
(Quentin Casasnovas) [Orabug: 25765786] (CVE-2016-10142) (CVE-2016-10142)

- net: ping: check minimum size on ICMP header length (Kees Cook) [Orabug: 25766914] (CVE-2016-8399)

- ipv6: stop sending PTB packets for MTU < 1280 (Hagen Paul Pfeifer) [Orabug: 25765786] (CVE-2016-10142)

- sg_write/bsg_write is not fit to be called under KERNEL_DS (Al Viro) [Orabug: 25765448] (CVE-2016-10088)

- scsi: sg: check length passed to SG_NEXT_CMD_LEN (peter chang) [Orabug: 25752011] (CVE-2017-7187)

- tty: n_hdlc: get rid of racy n_hdlc.tbuf (Alexander Popov) [Orabug: 25696689] (CVE-2017-2636)

- TTY: n_hdlc, fix lockdep false positive (Jiri Slaby) [Orabug: 25696689] (CVE-2017-2636)

- drivers/tty/n_hdlc.c: replace kmalloc/memset by kzalloc (Fabian Frederick) [Orabug: 25696689] (CVE-2017-2636)

- list: introduce list_first_entry_or_null (Jiri Pirko) [Orabug: 25696689] (CVE-2017-2636)

- firewire: net: guard against rx buffer overflows (Stefan Richter) [Orabug: 25451538] (CVE-2016-8633)

- x86/mm/32: Enable full randomization on i386 and X86_32 (Hector Marco-Gisbert) [Orabug: 25463929] (CVE-2016-3672)

- x86 get_unmapped_area: Access mmap_legacy_base through mm_struct member (Radu Caragea) [Orabug: 25463929] (CVE-2016-3672)

- sg_start_req: make sure that there's not too many elements in iovec (Al Viro) [Orabug: 25490377] (CVE-2015-5707)

- tcp: take care of truncations done by sk_filter (Eric Dumazet) [Orabug: 25507232] (CVE-2016-8645)

- rose: limit sk_filter trim to payload (Willem de Bruijn) [Orabug: 25507232] (CVE-2016-8645)

- scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer (Dan Carpenter) [Orabug: 25507330] (CVE-2016-7425)

- x86: bpf_jit: fix compilation of large bpf programs (Alexei Starovoitov) [Orabug: 25507375] (CVE-2015-4700)

- net: fix a kernel infoleak in x25 module (Kangjie Lu) [Orabug: 25512417] (CVE-2016-4580)

- USB: digi_acceleport: do sanity checking for the number of ports (Oliver Neukum) [Orabug: 25512472] (CVE-2016-3140)

- net/llc: avoid BUG_ON in skb_orphan (Eric Dumazet) [Orabug: 25682437] (CVE-2017-6345)

- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Andrey Konovalov) [Orabug: 25598277] (CVE-2017-6074)

- vfs: read file_handle only once in handle_to_path (Sasha Levin) [Orabug: 25388709] (CVE-2015-1420)

- crypto: algif_hash - Only export and import on sockets with data (Herbert Xu) [Orabug: 25417807]

- USB: usbfs: fix potential infoleak in devio (Kangjie Lu) [Orabug: 25462763] (CVE-2016-4482)

- net: fix infoleak in llc (Kangjie Lu) [Orabug: 25462811] (CVE-2016-4485)

- af_unix: Guard against other == sk in unix_dgram_sendmsg (Rainer Weikusat) [Orabug: 25464000] (CVE-2013-7446)

- unix: avoid use-after-free in ep_remove_wait_queue (Rainer Weikusat) [Orabug: 25464000] (CVE-2013-7446)


Update the affected kernel-uek / kernel-uek-firmware packages.

See Also

Plugin Details

Severity: Critical

ID: 100238

File Name: oraclevm_OVMSA-2017-0106.nasl

Version: $Revision: 3.6 $

Type: local

Published: 2017/05/17

Modified: 2018/01/29

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:kernel-uek, p-cpe:/a:oracle:vm:kernel-uek-firmware, cpe:/o:oracle:vm_server:3.2

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/05/16

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-7446, CVE-2015-1420, CVE-2015-4700, CVE-2015-5257, CVE-2015-5707, CVE-2015-6252, CVE-2015-6937, CVE-2015-9731, CVE-2016-10088, CVE-2016-10142, CVE-2016-10229, CVE-2016-2782, CVE-2016-3140, CVE-2016-3672, CVE-2016-4482, CVE-2016-4485, CVE-2016-4580, CVE-2016-7425, CVE-2016-7910, CVE-2016-8399, CVE-2016-8633, CVE-2016-8645, CVE-2017-2583, CVE-2017-2636, CVE-2017-2647, CVE-2017-5669, CVE-2017-5986, CVE-2017-6074, CVE-2017-6214, CVE-2017-6345, CVE-2017-7184, CVE-2017-7187, CVE-2017-7895

BID: 72357, 75356

OSVDB: 117759, 123637, 125710, 126403, 127759, 128036, 130525, 130545, 135143, 135876, 136761, 137963, 138086, 138444, 144411, 146778, 147034, 147168, 148195, 148443, 150179, 150690, 152094, 152302, 152453, 152521, 152728, 152729, 153186, 153853, 154043, 154627, 154861, 156529, 156530, 157982