ELSA-2016-3566

ELSA-2016-3566 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-05-20

Description


[2.6.39-400.278.3]
- net: add validation for the socket syscall protocol argument (Hannes Frederic Sowa) [Orabug: 23267976] {CVE-2015-8543} {CVE-2015-8543}
- ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) [Orabug: 23263251] {CVE-2015-8215}
- ext4: avoid hang when mounting non-journal filesystems with orphan list (Theodore Ts'o) [Orabug: 23262219] {CVE-2015-7509}
- ext4: make orphan functions be no-op in no-journal mode (Anatol Pomozov) [Orabug: 23262219] {CVE-2015-7509}
- unix: properly account for FDs passed over unix sockets (willy tarreau) [Orabug: 23262265] {CVE-2013-4312} {CVE-2013-4312}


Related CVEs


CVE-2013-4312
CVE-2015-8215
CVE-2015-8543
CVE-2015-7509

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.278.3.el5uek.src.rpm97ff53d62f930409280a2c2d30298bb8ELSA-2017-3607
kernel-uek-2.6.39-400.278.3.el5uek.i686.rpm4ab3fdf02cb01f657ffe2874b860a3a6ELSA-2017-3607
kernel-uek-debug-2.6.39-400.278.3.el5uek.i686.rpmc113036d72ddd8665f65f98c75ec1966ELSA-2017-3607
kernel-uek-debug-devel-2.6.39-400.278.3.el5uek.i686.rpm50cf71b0a3e8d756a27eae8ae8550693ELSA-2017-3607
kernel-uek-devel-2.6.39-400.278.3.el5uek.i686.rpm3a167d3dcb836c39ecd83f45d382dbe3ELSA-2017-3607
kernel-uek-doc-2.6.39-400.278.3.el5uek.noarch.rpmdcafc49148eaccf224dd9cde077123b5ELSA-2017-3607
kernel-uek-firmware-2.6.39-400.278.3.el5uek.noarch.rpmd9c419e0fa83df51c1ac8561a76734e5ELSA-2017-3607
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.278.3.el5uek.src.rpm97ff53d62f930409280a2c2d30298bb8ELSA-2017-3607
kernel-uek-2.6.39-400.278.3.el5uek.x86_64.rpm01e986fcbc26a5dbe624ebb90b6b5cb8ELSA-2017-3607
kernel-uek-debug-2.6.39-400.278.3.el5uek.x86_64.rpm4cfb9b1a134ef157e0160b9d46773ef0ELSA-2017-3607
kernel-uek-debug-devel-2.6.39-400.278.3.el5uek.x86_64.rpmf6c333a4ae322c14b1aafe5d381fbcbcELSA-2017-3607
kernel-uek-devel-2.6.39-400.278.3.el5uek.x86_64.rpm1956d11e439a8304aac9ac04e9155256ELSA-2017-3607
kernel-uek-doc-2.6.39-400.278.3.el5uek.noarch.rpmdcafc49148eaccf224dd9cde077123b5ELSA-2017-3607
kernel-uek-firmware-2.6.39-400.278.3.el5uek.noarch.rpmd9c419e0fa83df51c1ac8561a76734e5ELSA-2017-3607
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.278.3.el6uek.src.rpma7d639e96bb8b0d8dbde8a06a8e06928ELSA-2017-3605
kernel-uek-2.6.39-400.278.3.el6uek.i686.rpm7907feae46bf163e196e94d175eda271ELSA-2017-3605
kernel-uek-debug-2.6.39-400.278.3.el6uek.i686.rpm60630d56e50e809af63034f0cd5ee775ELSA-2017-3605
kernel-uek-debug-devel-2.6.39-400.278.3.el6uek.i686.rpm7279fd514690093b29990a239c75c79bELSA-2017-3605
kernel-uek-devel-2.6.39-400.278.3.el6uek.i686.rpm4dab1dfdd935da70b6c162208ff0b43fELSA-2017-3605
kernel-uek-doc-2.6.39-400.278.3.el6uek.noarch.rpm5bfb7badf3ea73bbe75f7f5d4c9023c9ELSA-2017-3605
kernel-uek-firmware-2.6.39-400.278.3.el6uek.noarch.rpmc58e0b01a4e2b2fd1855c75d97202e6bELSA-2017-3605
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.278.3.el6uek.src.rpma7d639e96bb8b0d8dbde8a06a8e06928ELSA-2017-3605
kernel-uek-2.6.39-400.278.3.el6uek.x86_64.rpmf4e6cecd818826d38c6537d8c05bdc44ELSA-2017-3605
kernel-uek-debug-2.6.39-400.278.3.el6uek.x86_64.rpmf24c49e386689fa48e83293d9905cfe1ELSA-2017-3605
kernel-uek-debug-devel-2.6.39-400.278.3.el6uek.x86_64.rpmf6f0be671169d3db961cd5bbd2f42898ELSA-2017-3605
kernel-uek-devel-2.6.39-400.278.3.el6uek.x86_64.rpm150123308d99d2fc52cfb84e32f85b9fELSA-2017-3605
kernel-uek-doc-2.6.39-400.278.3.el6uek.noarch.rpm5bfb7badf3ea73bbe75f7f5d4c9023c9ELSA-2017-3605
kernel-uek-firmware-2.6.39-400.278.3.el6uek.noarch.rpmc58e0b01a4e2b2fd1855c75d97202e6bELSA-2017-3605



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete