OVMSA-2016-0053

OVMSA-2016-0053 - kernel-uek security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-05-20

Description


[3.8.13-118.6.2]
- KEYS: Fix ASN.1 indefinite length object parsing This fixes CVE-2016-0758. (David Howells) [Orabug: 23279020] {CVE-2016-0758}
- net: add validation for the socket syscall protocol argument (Hannes Frederic Sowa) [Orabug: 23267997] {CVE-2015-8543} {CVE-2015-8543}
- ipv6: addrconf: validate new MTU before applying it (Marcelo Leitner) [Orabug: 23263252] {CVE-2015-8215}
- unix: properly account for FDs passed over unix sockets (willy tarreau) [Orabug: 23262276] {CVE-2013-4312} {CVE-2013-4312}


Related CVEs


CVE-2015-8543
CVE-2013-4312
CVE-2016-0758
CVE-2015-8215

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) kernel-uek-3.8.13-118.6.2.el6uek.src.rpme888f1ed9dbad564c30a086570e4b90a2e6e36df80adfebd67b49b542e4fd802OVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-3.8.13-118.6.2.el6uek.x86_64.rpm7a4fead4e0d62ddda5c3c78fa333746df1605aada29092788644167da75cf56fOVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-firmware-3.8.13-118.6.2.el6uek.noarch.rpmd1fd5937de475fd851aef9d22817f3c60a94aa26e116dc51d87b5865b0049485OVMSA-2025-0001ovm3_x86_64_3.3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete