Oracle Linux Security Advisory ELSA-2023-12826

https://linux.oracle.com/errata/ELSA-2023-12826.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

aarch64:
kernel-uek-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-debug-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-debug-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-tools-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-tools-libs-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-tools-libs-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
perf-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
python-perf-4.14.35-2047.529.3.2.el7uek.aarch64.rpm
kernel-uek-headers-4.14.35-2047.529.3.2.el7uek.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-uek-4.14.35-2047.529.3.2.el7uek.src.rpm

Related CVEs:

CVE-2023-42753




Description of changes:

[4.14.35-2047.529.3.2.el7uek]
- netfilter: xt_sctp: validate the flag_info count (Wander Lairson Costa)  [Orabug: 35824309]
- netfilter: xt_u32: validate user space input (Wander Lairson Costa)  [Orabug: 35824309]
- netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c (Kyle Zeng)  [Orabug: 35824309]  {CVE-2023-42753}


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2023-12826: kernel Important (aarch64) Security Update

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[4.14.35-2047.529.3.2.el7uek] - netfilter: xt_sctp: validate the flag_info count (Wander Lairson Costa) [Orabug: 35824309] - netfilter: xt_u32: validate user space input (Wander Lairson Costa) [Orabug: 35824309] - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c (Kyle Zeng) [Orabug: 35824309] {CVE-2023-42753}

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-uek-4.14.35-2047.529.3.2.el7uek.src.rpm

x86_64

aarch64

kernel-uek-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-debug-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-debug-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-tools-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-tools-libs-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-tools-libs-devel-4.14.35-2047.529.3.2.el7uek.aarch64.rpm perf-4.14.35-2047.529.3.2.el7uek.aarch64.rpm python-perf-4.14.35-2047.529.3.2.el7uek.aarch64.rpm kernel-uek-headers-4.14.35-2047.529.3.2.el7uek.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-42753

Related News