Описание
ELSA-2024-12266: kernel security update (IMPORTANT)
[4.18.0-513.18.1.0.1_9.OL8]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters [Orabug: 36461932] {CVE-2024-1086}
[4.18.0-513.18.1_9.OL8]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
- Drop not needed patch
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
4.18.0-513.18.1.0.1.el8_9
kernel-cross-headers
4.18.0-513.18.1.0.1.el8_9
kernel-headers
4.18.0-513.18.1.0.1.el8_9
kernel-tools
4.18.0-513.18.1.0.1.el8_9
kernel-tools-libs
4.18.0-513.18.1.0.1.el8_9
kernel-tools-libs-devel
4.18.0-513.18.1.0.1.el8_9
perf
4.18.0-513.18.1.0.1.el8_9
python3-perf
4.18.0-513.18.1.0.1.el8_9
Oracle Linux x86_64
bpftool
4.18.0-513.18.1.0.1.el8_9
kernel
4.18.0-513.18.1.0.1.el8_9
kernel-abi-stablelists
4.18.0-513.18.1.0.1.el8_9
kernel-core
4.18.0-513.18.1.0.1.el8_9
kernel-cross-headers
4.18.0-513.18.1.0.1.el8_9
kernel-debug
4.18.0-513.18.1.0.1.el8_9
kernel-debug-core
4.18.0-513.18.1.0.1.el8_9
kernel-debug-devel
4.18.0-513.18.1.0.1.el8_9
kernel-debug-modules
4.18.0-513.18.1.0.1.el8_9
kernel-debug-modules-extra
4.18.0-513.18.1.0.1.el8_9
kernel-devel
4.18.0-513.18.1.0.1.el8_9
kernel-doc
4.18.0-513.18.1.0.1.el8_9
kernel-headers
4.18.0-513.18.1.0.1.el8_9
kernel-modules
4.18.0-513.18.1.0.1.el8_9
kernel-modules-extra
4.18.0-513.18.1.0.1.el8_9
kernel-tools
4.18.0-513.18.1.0.1.el8_9
kernel-tools-libs
4.18.0-513.18.1.0.1.el8_9
kernel-tools-libs-devel
4.18.0-513.18.1.0.1.el8_9
perf
4.18.0-513.18.1.0.1.el8_9
python3-perf
4.18.0-513.18.1.0.1.el8_9
Связанные CVE
Связанные уязвимости
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...