OVMSA-2016-0053 - kernel-uek security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2016-05-20 |
Description
[3.8.13-118.6.2]
- KEYS: Fix ASN.1 indefinite length object parsing This fixes CVE-2016-0758. (David Howells) [Orabug: 23279020] {CVE-2016-0758}
- net: add validation for the socket syscall protocol argument (Hannes Frederic Sowa) [Orabug: 23267997] {CVE-2015-8543} {CVE-2015-8543}
- ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) [Orabug: 23263252] {CVE-2015-8215}
- unix: properly account for FDs passed over unix sockets (willy tarreau) [Orabug: 23262276] {CVE-2013-4312} {CVE-2013-4312}
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.3 (x86_64) | kernel-uek-3.8.13-118.6.2.el6uek.src.rpm | e888f1ed9dbad564c30a086570e4b90a2e6e36df80adfebd67b49b542e4fd802 | OVMSA-2025-0001 | ovm3_x86_64_3.3_patch |
| kernel-uek-3.8.13-118.6.2.el6uek.x86_64.rpm | 7a4fead4e0d62ddda5c3c78fa333746df1605aada29092788644167da75cf56f | OVMSA-2025-0001 | ovm3_x86_64_3.3_patch |
| kernel-uek-firmware-3.8.13-118.6.2.el6uek.noarch.rpm | d1fd5937de475fd851aef9d22817f3c60a94aa26e116dc51d87b5865b0049485 | OVMSA-2025-0001 | ovm3_x86_64_3.3_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team