OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0256)

high Nessus Plugin ID 117512


The remote OracleVM host is missing one or more security updates.


The remote OracleVM system is missing necessary patches to address critical security updates :

- tcp: add tcp_ooo_try_coalesce helper (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: call tcp_drop from tcp_data_queue_ofo (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: detect malicious patterns in tcp_collapse_ofo_queue (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: avoid collapses in tcp_prune_queue if possible (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: free batches of packets in tcp_prune_ofo_queue (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: use an RB tree for ooo receive queue (Yaogong Wang) [Orabug: 28639707] (CVE-2018-5390)

- tcp: refine tcp_prune_ofo_queue to not drop all packets (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: introduce tcp_under_memory_pressure (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)

- tcp: increment sk_drops for dropped rx packets (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390)


Update the affected kernel-uek / kernel-uek-firmware packages.

See Also

Plugin Details

Severity: High

ID: 117512

File Name: oraclevm_OVMSA-2018-0256.nasl

Version: 1.3

Type: local

Published: 9/17/2018

Updated: 9/27/2019

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: High

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C


Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:kernel-uek, p-cpe:/a:oracle:vm:kernel-uek-firmware, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Patch Publication Date: 9/14/2018

Vulnerability Publication Date: 8/6/2018

Reference Information

CVE: CVE-2018-5390