OVMSA-2023-0025

OVMSA-2023-0025 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2023-12-07

Description


[4.1.12-124.81.2]
- rebuild bumping release

[4.1.12-124.81.1]
- netfilter: xt_sctp: validate the flag_info count (Wander Lairson Costa) [Orabug: 35923500] {CVE-2023-39193}
- USB: ene_usb6250: Allocate enough memory for full object (Kees Cook) [Orabug: 35924058] {CVE-2023-45862}
- netfilter: xt_u32: validate user space input (Wander Lairson Costa) [Orabug: 35923470] {CVE-2023-39192}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (valis) [Orabug: 35707466] {CVE-2023-4207}


Related CVEs


CVE-2023-39192
CVE-2023-4207
CVE-2023-39193
CVE-2023-45862

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3 (x86_64) kernel-uek-4.1.12-124.81.2.el6uek.src.rpm5295571e9357ad2fd06acc513089867b1ff788561ef6a67c45cdb2ae9beb32a9OVMSA-2025-0001ovm3_x86_64_ELS
kernel-uek-4.1.12-124.81.2.el6uek.x86_64.rpm233a36eba79efcb414d2b43e324ffccd902b6b86a2cbcdab897f9158cb959cdbOVMSA-2025-0001ovm3_x86_64_ELS
kernel-uek-firmware-4.1.12-124.81.2.el6uek.noarch.rpma20fb3f9b4f4bd45b4174d2346fd19572f1f8cf3e5e9414e4f958848d5dfc4f4OVMSA-2025-0001ovm3_x86_64_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete