Описание
ELSA-2024-12256: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.4.17-2136.329.3.2]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [Orabug: 36465920] {CVE-2024-1086}
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
5.4.17-2136.329.3.2.el7uek
kernel-uek-debug
5.4.17-2136.329.3.2.el7uek
kernel-uek-debug-devel
5.4.17-2136.329.3.2.el7uek
kernel-uek-devel
5.4.17-2136.329.3.2.el7uek
kernel-uek-doc
5.4.17-2136.329.3.2.el7uek
kernel-uek-tools
5.4.17-2136.329.3.2.el7uek
kernel-uek-tools-libs
5.4.17-2136.329.3.2.el7uek
perf
5.4.17-2136.329.3.2.el7uek
python-perf
5.4.17-2136.329.3.2.el7uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.329.3.2.el7uek
kernel-uek-debug
5.4.17-2136.329.3.2.el7uek
kernel-uek-debug-devel
5.4.17-2136.329.3.2.el7uek
kernel-uek-devel
5.4.17-2136.329.3.2.el7uek
kernel-uek-doc
5.4.17-2136.329.3.2.el7uek
kernel-uek-tools
5.4.17-2136.329.3.2.el7uek
Oracle Linux 8
Oracle Linux aarch64
kernel-uek
5.4.17-2136.329.3.2.el8uek
kernel-uek-debug
5.4.17-2136.329.3.2.el8uek
kernel-uek-debug-devel
5.4.17-2136.329.3.2.el8uek
kernel-uek-devel
5.4.17-2136.329.3.2.el8uek
kernel-uek-doc
5.4.17-2136.329.3.2.el8uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.329.3.2.el8uek
kernel-uek-debug
5.4.17-2136.329.3.2.el8uek
kernel-uek-debug-devel
5.4.17-2136.329.3.2.el8uek
kernel-uek-devel
5.4.17-2136.329.3.2.el8uek
kernel-uek-doc
5.4.17-2136.329.3.2.el8uek
Связанные CVE
Связанные уязвимости
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...