OracleVM 3.4 : Unbreakable / etc (OVMSA-2021-0031)

critical Nessus Plugin ID 153582
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote OracleVM host is missing one or more security updates.


The remote OracleVM system is missing necessary patches to address critical security updates :

- fs/namespace.c: fix mountpoint reference counter race (Piotr Krysiuk) [Orabug: 33369433] (CVE-2020-12114) (CVE-2020-12114)

- btrfs: only search for left_info if there is no right_info in try_merge_free_space (Josef Bacik) [Orabug: 33369414] (CVE-2019-19448) (CVE-2019-19448)

- cfg80211: wext: avoid copying malformed SSIDs (Will Deacon) [Orabug: 33369390] (CVE-2019-17133)

- vhost_net: fix possible infinite loop (Jason Wang) [Orabug: 33369374] (CVE-2019-3900) (CVE-2019-3900)

- vhost: introduce vhost_exceeds_weight (Jason Wang) [Orabug: 33369374] (CVE-2019-3900)

- vhost_net: introduce vhost_exceeds_weight (Jason Wang) [Orabug: 33369374] (CVE-2019-3900)

- vhost_net: use packet weight for rx handler, too (Paolo Abeni) [Orabug: 33369374] (CVE-2019-3900)

- vhost-net: set packet weight of tx polling to 2 * vq size (haibinzhang(&#x5F20 &#x6D77 &#x658C )) [Orabug:
33369374] (CVE-2019-3900)

- mac80211: extend protection against mixed key and fragment cache attacks (Wen Gong) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147) (CVE-2020-24586) (CVE-2020-24587)

- mac80211: do not accept/forward invalid EAPOL frames (Johannes Berg) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147)

- mac80211: prevent attacks on TKIP/WEP as well (Johannes Berg) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147)

- mac80211: check defrag PN against current frame (Johannes Berg) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147)

- mac80211: add fragment cache to sta_info (Johannes Berg) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147)

- mac80211: drop A-MSDUs on old ciphers (Johannes Berg) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147) (CVE-2020-24588)

- cfg80211: mitigate A-MSDU aggregation attacks (Mathy Vanhoef) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147) (CVE-2020-24588)

- mac80211: properly handle A-MSDUs that start with an RFC 1042 header (Mathy Vanhoef) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147)

- mac80211: prevent mixed key and fragment cache attacks (Mathy Vanhoef) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147) (CVE-2020-24587) (CVE-2020-24586)

- mac80211: assure all fragments are encrypted (Mathy Vanhoef) [Orabug: 33369361] (CVE-2020-24586) (CVE-2020-26139) (CVE-2020-24587) (CVE-2020-24588) (CVE-2020-26139) (CVE-2020-26140) (CVE-2020-26141) (CVE-2020-26142) (CVE-2020-26143) (CVE-2020-26144) (CVE-2020-26145) (CVE-2020-26146) (CVE-2020-26147) (CVE-2020-26147)

- sctp: validate from_addr_param return (Marcelo Ricardo Leitner) [Orabug: 33369303] (CVE-2021-3655)

- virtio_console: Assure used length from device is limited (Xie Yongji) [Orabug: 33369276] (CVE-2021-38160)

- net_sched: cls_route: remove the right filter from hashtable (Cong Wang) [Orabug: 33369231] (CVE-2021-3715)

- HID: make arrays usage and value to be the same (Will McVicker) [Orabug: 33369121] (CVE-2021-0512)

- ext4: fix race writing to an inline_data file while its xattrs are changing (Theodore Ts'o) [Orabug: 33369043] (CVE-2021-40490)


Update the affected kernel-uek / kernel-uek-firmware packages.

See Also

Plugin Details

Severity: Critical

ID: 153582

File Name: oraclevm_OVMSA-2021-0031.nasl

Version: 1.2

Type: local

Published: 9/23/2021

Updated: 9/27/2021

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2019-17133


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:vm:kernel-uek:*:*:*:*:*:*:*, p-cpe:2.3:a:oracle:vm:kernel-uek-firmware:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/22/2021

Vulnerability Publication Date: 4/25/2019

Reference Information

CVE: CVE-2019-3900, CVE-2019-17133, CVE-2019-19448, CVE-2020-12114, CVE-2020-24588, CVE-2020-24587, CVE-2020-26144, CVE-2020-24586, CVE-2020-26139, CVE-2020-26145, CVE-2020-26143, CVE-2020-26142, CVE-2020-26140, CVE-2020-26147, CVE-2020-26146, CVE-2020-26141, CVE-2021-0512, CVE-2021-3655, CVE-2021-38160, CVE-2021-40490, CVE-2021-3715