OVMSA-2023-0025 - Unbreakable Enterprise kernel security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2023-12-07 |
Description
[4.1.12-124.81.2]
- rebuild bumping release
[4.1.12-124.81.1]
- netfilter: xt_sctp: validate the flag_info count (Wander Lairson Costa) [Orabug: 35923500] {CVE-2023-39193}
- USB: ene_usb6250: Allocate enough memory for full object (Kees Cook) [Orabug: 35924058] {CVE-2023-45862}
- netfilter: xt_u32: validate user space input (Wander Lairson Costa) [Orabug: 35923470] {CVE-2023-39192}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (valis) [Orabug: 35707466] {CVE-2023-4207}
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3 (x86_64) | kernel-uek-4.1.12-124.81.2.el6uek.src.rpm | 5295571e9357ad2fd06acc513089867b1ff788561ef6a67c45cdb2ae9beb32a9 | OVMSA-2025-0001 | ovm3_x86_64_ELS |
| kernel-uek-4.1.12-124.81.2.el6uek.x86_64.rpm | 233a36eba79efcb414d2b43e324ffccd902b6b86a2cbcdab897f9158cb959cdb | OVMSA-2025-0001 | ovm3_x86_64_ELS |
| kernel-uek-firmware-4.1.12-124.81.2.el6uek.noarch.rpm | a20fb3f9b4f4bd45b4174d2346fd19572f1f8cf3e5e9414e4f958848d5dfc4f4 | OVMSA-2025-0001 | ovm3_x86_64_ELS |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team