Описание
ELSA-2024-12255: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.15.0-204.147.6.3]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [Orabug: 36464807] {CVE-2024-1086}
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
5.15.0-204.147.6.3.el8uek
kernel-uek
5.15.0-204.147.6.3.el8uek
kernel-uek-container
5.15.0-204.147.6.3.el8uek
kernel-uek-container-debug
5.15.0-204.147.6.3.el8uek
kernel-uek-core
5.15.0-204.147.6.3.el8uek
kernel-uek-debug
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-core
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-devel
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-modules
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-modules-extra
5.15.0-204.147.6.3.el8uek
kernel-uek-devel
5.15.0-204.147.6.3.el8uek
kernel-uek-doc
5.15.0-204.147.6.3.el8uek
kernel-uek-modules
5.15.0-204.147.6.3.el8uek
kernel-uek-modules-extra
5.15.0-204.147.6.3.el8uek
Oracle Linux x86_64
bpftool
5.15.0-204.147.6.3.el8uek
kernel-uek
5.15.0-204.147.6.3.el8uek
kernel-uek-container
5.15.0-204.147.6.3.el8uek
kernel-uek-container-debug
5.15.0-204.147.6.3.el8uek
kernel-uek-core
5.15.0-204.147.6.3.el8uek
kernel-uek-debug
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-core
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-devel
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-modules
5.15.0-204.147.6.3.el8uek
kernel-uek-debug-modules-extra
5.15.0-204.147.6.3.el8uek
kernel-uek-devel
5.15.0-204.147.6.3.el8uek
kernel-uek-doc
5.15.0-204.147.6.3.el8uek
kernel-uek-modules
5.15.0-204.147.6.3.el8uek
kernel-uek-modules-extra
5.15.0-204.147.6.3.el8uek
Oracle Linux 9
Oracle Linux aarch64
bpftool
5.15.0-204.147.6.3.el9uek
kernel-uek
5.15.0-204.147.6.3.el9uek
kernel-uek-core
5.15.0-204.147.6.3.el9uek
kernel-uek-debug
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-core
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-devel
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-modules
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-modules-extra
5.15.0-204.147.6.3.el9uek
kernel-uek-devel
5.15.0-204.147.6.3.el9uek
kernel-uek-doc
5.15.0-204.147.6.3.el9uek
kernel-uek-modules
5.15.0-204.147.6.3.el9uek
kernel-uek-modules-extra
5.15.0-204.147.6.3.el9uek
Oracle Linux x86_64
bpftool
5.15.0-204.147.6.3.el9uek
kernel-uek
5.15.0-204.147.6.3.el9uek
kernel-uek-container
5.15.0-204.147.6.3.el9uek
kernel-uek-container-debug
5.15.0-204.147.6.3.el9uek
kernel-uek-core
5.15.0-204.147.6.3.el9uek
kernel-uek-debug
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-core
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-devel
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-modules
5.15.0-204.147.6.3.el9uek
kernel-uek-debug-modules-extra
5.15.0-204.147.6.3.el9uek
kernel-uek-devel
5.15.0-204.147.6.3.el9uek
kernel-uek-doc
5.15.0-204.147.6.3.el9uek
kernel-uek-modules
5.15.0-204.147.6.3.el9uek
kernel-uek-modules-extra
5.15.0-204.147.6.3.el9uek
Связанные CVE
Связанные уязвимости
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...