Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-12255

Опубликовано: 01 апр. 2024
Источник: oracle-oval
Платформа: Oracle Linux 8
Платформа: Oracle Linux 9

Описание

ELSA-2024-12255: Unbreakable Enterprise kernel security update (IMPORTANT)

[5.15.0-204.147.6.3]

  • netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [Orabug: 36464807] {CVE-2024-1086}

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bpftool

5.15.0-204.147.6.3.el8uek

kernel-uek

5.15.0-204.147.6.3.el8uek

kernel-uek-container

5.15.0-204.147.6.3.el8uek

kernel-uek-container-debug

5.15.0-204.147.6.3.el8uek

kernel-uek-core

5.15.0-204.147.6.3.el8uek

kernel-uek-debug

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-core

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-devel

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-modules

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-modules-extra

5.15.0-204.147.6.3.el8uek

kernel-uek-devel

5.15.0-204.147.6.3.el8uek

kernel-uek-doc

5.15.0-204.147.6.3.el8uek

kernel-uek-modules

5.15.0-204.147.6.3.el8uek

kernel-uek-modules-extra

5.15.0-204.147.6.3.el8uek

Oracle Linux x86_64

bpftool

5.15.0-204.147.6.3.el8uek

kernel-uek

5.15.0-204.147.6.3.el8uek

kernel-uek-container

5.15.0-204.147.6.3.el8uek

kernel-uek-container-debug

5.15.0-204.147.6.3.el8uek

kernel-uek-core

5.15.0-204.147.6.3.el8uek

kernel-uek-debug

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-core

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-devel

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-modules

5.15.0-204.147.6.3.el8uek

kernel-uek-debug-modules-extra

5.15.0-204.147.6.3.el8uek

kernel-uek-devel

5.15.0-204.147.6.3.el8uek

kernel-uek-doc

5.15.0-204.147.6.3.el8uek

kernel-uek-modules

5.15.0-204.147.6.3.el8uek

kernel-uek-modules-extra

5.15.0-204.147.6.3.el8uek

Oracle Linux 9

Oracle Linux aarch64

bpftool

5.15.0-204.147.6.3.el9uek

kernel-uek

5.15.0-204.147.6.3.el9uek

kernel-uek-core

5.15.0-204.147.6.3.el9uek

kernel-uek-debug

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-core

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-devel

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-modules

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-modules-extra

5.15.0-204.147.6.3.el9uek

kernel-uek-devel

5.15.0-204.147.6.3.el9uek

kernel-uek-doc

5.15.0-204.147.6.3.el9uek

kernel-uek-modules

5.15.0-204.147.6.3.el9uek

kernel-uek-modules-extra

5.15.0-204.147.6.3.el9uek

Oracle Linux x86_64

bpftool

5.15.0-204.147.6.3.el9uek

kernel-uek

5.15.0-204.147.6.3.el9uek

kernel-uek-container

5.15.0-204.147.6.3.el9uek

kernel-uek-container-debug

5.15.0-204.147.6.3.el9uek

kernel-uek-core

5.15.0-204.147.6.3.el9uek

kernel-uek-debug

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-core

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-devel

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-modules

5.15.0-204.147.6.3.el9uek

kernel-uek-debug-modules-extra

5.15.0-204.147.6.3.el9uek

kernel-uek-devel

5.15.0-204.147.6.3.el9uek

kernel-uek-doc

5.15.0-204.147.6.3.el9uek

kernel-uek-modules

5.15.0-204.147.6.3.el9uek

kernel-uek-modules-extra

5.15.0-204.147.6.3.el9uek

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

CVSS3: 7.8
redhat
больше 1 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

CVSS3: 7.8
nvd
больше 1 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

CVSS3: 7.8
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.8
debian
больше 1 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...