OVMSA-2017-0005

OVMSA-2017-0005 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-01-12

Description


[3.8.13-118.16.2]
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE (Eric Dumazet) [Orabug: 25203623] {CVE-2016-9793}

[3.8.13-118.16.1]
- nvme: Limit command retries (Ashok Vairavan) [Orabug: 25374794]
- tcp: fix use after free in tcp_xmit_retransmit_queue() (Eric Dumazet) [Orabug: 25374371] {CVE-2016-6828}
- logging errors that get masked to EIO inside drivers/block/loop.c (Manjunath Patil) [Orabug: 22505535]
- ALSA: pcm : Call kill_fasync() in stream lock (Takashi Iwai) [Orabug: 25203963] {CVE-2016-9794}
- packet: fix race condition in packet_set_ring (Philip Pettersson) [Orabug: 25217756] {CVE-2016-8655}
- x86: kvmclock: zero initialize pvclock shared memory area (Igor Mammedov) [Orabug: 25218431]
- KEYS: Fix short sprintf buffer in /proc/keys show function (David Howells) [Orabug: 25306373] {CVE-2016-7042}


Related CVEs


CVE-2016-9793
CVE-2016-9794
CVE-2016-7042
CVE-2016-6828
CVE-2016-8655

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) kernel-uek-3.8.13-118.16.2.el6uek.src.rpm6af38f9fc0ac939e5e3d73bc83eea136aa87033b6df8ef191d5166e899eeee20OVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-3.8.13-118.16.2.el6uek.x86_64.rpmef73d22fb9545a4f899791d5cb95806579bd2aa14c1b0cc54796cddd3c978705OVMSA-2025-0001ovm3_x86_64_3.3_patch
kernel-uek-firmware-3.8.13-118.16.2.el6uek.noarch.rpmdc0054aeffe931997c37c40778f4b3c78299a4a271e7c9b09c60605f0a981810OVMSA-2025-0001ovm3_x86_64_3.3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete