Описание
ELSA-2024-12265: kernel security update (IMPORTANT)
-
[5.14.0-362.24.1.0.1_3.OL9]
-
netfilter: nf_tables: reject QUEUE/DROP verdict parameters [Orabug: 36461940 ] {CVE-2024-1086}
-
[5.14.0-362.24.1_3.OL9]
-
Update Oracle Linux certificates (Kevin Lyons)
-
Disable signing for aarch64 (Ilya Okomin)
-
Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
-
Update x509.genkey [Orabug: 24817676]
-
Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
-
Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]
-
Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
-
Disable unified kernel image package build
-
Add Oracle Linux IMA certificates
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
bpftool
7.2.0-362.24.1.0.1.el9_3
kernel-cross-headers
5.14.0-362.24.1.0.1.el9_3
kernel-headers
5.14.0-362.24.1.0.1.el9_3
kernel-tools
5.14.0-362.24.1.0.1.el9_3
kernel-tools-libs
5.14.0-362.24.1.0.1.el9_3
kernel-tools-libs-devel
5.14.0-362.24.1.0.1.el9_3
perf
5.14.0-362.24.1.0.1.el9_3
python3-perf
5.14.0-362.24.1.0.1.el9_3
Oracle Linux x86_64
bpftool
7.2.0-362.24.1.0.1.el9_3
kernel
5.14.0-362.24.1.0.1.el9_3
kernel-abi-stablelists
5.14.0-362.24.1.0.1.el9_3
kernel-core
5.14.0-362.24.1.0.1.el9_3
kernel-cross-headers
5.14.0-362.24.1.0.1.el9_3
kernel-debug
5.14.0-362.24.1.0.1.el9_3
kernel-debug-core
5.14.0-362.24.1.0.1.el9_3
kernel-debug-devel
5.14.0-362.24.1.0.1.el9_3
kernel-debug-devel-matched
5.14.0-362.24.1.0.1.el9_3
kernel-debug-modules
5.14.0-362.24.1.0.1.el9_3
kernel-debug-modules-core
5.14.0-362.24.1.0.1.el9_3
kernel-debug-modules-extra
5.14.0-362.24.1.0.1.el9_3
kernel-devel
5.14.0-362.24.1.0.1.el9_3
kernel-devel-matched
5.14.0-362.24.1.0.1.el9_3
kernel-doc
5.14.0-362.24.1.0.1.el9_3
kernel-headers
5.14.0-362.24.1.0.1.el9_3
kernel-modules
5.14.0-362.24.1.0.1.el9_3
kernel-modules-core
5.14.0-362.24.1.0.1.el9_3
kernel-modules-extra
5.14.0-362.24.1.0.1.el9_3
kernel-tools
5.14.0-362.24.1.0.1.el9_3
kernel-tools-libs
5.14.0-362.24.1.0.1.el9_3
kernel-tools-libs-devel
5.14.0-362.24.1.0.1.el9_3
libperf
5.14.0-362.24.1.0.1.el9_3
perf
5.14.0-362.24.1.0.1.el9_3
python3-perf
5.14.0-362.24.1.0.1.el9_3
rtla
5.14.0-362.24.1.0.1.el9_3
rv
5.14.0-362.24.1.0.1.el9_3
Связанные CVE
Связанные уязвимости
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...