Oracle Linux Security Advisory ELSA-2024-1249

https://linux.oracle.com/errata/ELSA-2024-1249.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.114.2.0.1.el7.noarch.rpm
kernel-debug-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-doc-3.10.0-1160.114.2.0.1.el7.noarch.rpm
kernel-headers-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
perf-3.10.0-1160.114.2.0.1.el7.x86_64.rpm
python-perf-3.10.0-1160.114.2.0.1.el7.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-3.10.0-1160.114.2.0.1.el7.src.rpm

Related CVEs:

CVE-2022-42896
CVE-2023-4921
CVE-2023-38409
CVE-2023-45871
CVE-2024-1086
CVE-2024-26602




Description of changes:

[3.10.0-1160.114.2.0.1.el7.OL7]
- debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}

[3.10.0-1160.114.2.el7.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9]
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)

[3.10.0-1160.114.2.el7]
- sched/membarrier: reduce the ability to hammer on sys_membarrier (Wander Lairson Costa) [RHEL-26402] {CVE-2024-26602}

[3.10.0-1160.114.1.el7]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [RHEL-23500] {CVE-2024-1086}

[3.10.0-1160.113.1.el7]
- igb: set max size RX buffer when store bad packet is enabled (Wander Lairson Costa) [RHEL-15181] {CVE-2023-45871}
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (David Marlin) [RHEL-2742] {CVE-2022-42896}
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (David Marlin) [RHEL-2742] {CVE-2022-42896}
- Bluetooth: Use separate L2CAP LE credit based connection result values (David Marlin) [RHEL-2742] {CVE-2022-42896}
- Bluetooth: L2CAP: Fix L2CAP_CR_SCID_IN_USE value (David Marlin) [RHEL-2742] {CVE-2022-42896}

[3.10.0-1160.112.1.el7]
- net: sched: sch_qfq: Use non-work-conserving warning handler (Davide Caratti) [RHEL-14397]
- net: sched: sch_qfq: Fix UAF in qfq_dequeue() (Davide Caratti) [RHEL-14397] {CVE-2023-4921}
- cpufreq: Initialize policy->kobj while allocating policy (Waiman Long) [2161654]
- net: bonding: fix possible NULL deref in rlb code (Hangbin Liu) [RHEL-17227]
- net: bonding: fix use-after-free after 802.3ad slave unbind (Hangbin Liu) [RHEL-17227]

[3.10.0-1160.111.1.el7]
- redhat: rewrite genlog and support Y- tags (Jan Stancek)
- scsi: zfcp: Fix double free of FSF request when qdio send fails (Tobias Huschle) [RHEL-16335]
- fbcon: set_con2fb_map needs to set con2fb_map! (Jocelyn Falempe) [RHEL-1204] {CVE-2023-38409}

[3.10.0-1160.110.1.el7]
- gfs2: Fix glock recursion on withdraw during recovery (Andreas Gruenbacher) [RHEL-17223]

[3.10.0-1160.109.1.el7]
- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (Waiman Long) [RHEL-17703]
- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (Oleksandr Natalenko) [2224973]
- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (Oleksandr Natalenko) [2224973]
- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (Oleksandr Natalenko) [2224973]


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2024-1249: kernel Important Security Update

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[3.10.0-1160.114.2.0.1.el7.OL7] - debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.114.2.el7.OL7] - Update Oracle Linux certificates (Ilya Okomin) - Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com) - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 <= 15-2.0.9] - Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin) [3.10.0-1160.114.2.el7] - sched/membarrier: reduce the ability to hammer on sys_membarrier (Wander Lairson Costa) [RHEL-26402] {CVE-2024-26602} [3.10.0-1160.114.1.el7] - netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [RHEL-23500] {CVE-2024-1086} [3.10.0-1160.113.1.el7] - igb: set max size RX buffer when store bad packet is enabled (Wander Lairson Costa) [RHEL-15181] {CVE-2023-45871} - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (David Marlin) [RHEL-2742] {CVE-2022-42896} - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (David Marlin) [RHEL-2742] {CVE-2022-42896} - Bluetooth: Use separate L2CAP LE credit based connection result values (David Marlin) [RHEL-2742] {CVE-2022-42896} - Bluetooth: L2CAP: Fix L2CAP_CR_SCID_IN_USE value (David Marlin) [RHEL-2742] {CVE-2022-42896} [3.10.0-1160.112.1.el7] - net: sched: sch_qfq: Use non-work-conserving warning handler (Davide Caratti) [RHEL-14397] - net: sched: sch_qfq: Fix UAF in qfq_dequeue() (Davide Caratti) [RHEL-14397] {CVE-2023-4921} - cpufreq: Initialize policy->kobj while allocating policy (Waiman Long) [2161654] - net: bonding: fix possible NULL deref in rlb code (Hangbin Liu) [RHEL-17227] - net: bonding: fix use-after-free after 802.3ad slave unbind (Hangbin Liu) [RHEL-17227] [3.10.0-1160.111.1.el7] - redhat: rewrite genlog and support Y- tags (Jan Stancek) - scsi: zfcp: Fix double free of FSF request when qdio send fails (Tobias Huschle) [RHEL-16335] - fbcon: set_con2fb_map needs to set con2fb_map! (Jocelyn Falempe) [RHEL-1204] {CVE-2023-38409} [3.10.0-1160.110.1.el7] - gfs2: Fix glock recursion on withdraw during recovery (Andreas Gruenbacher) [RHEL-17223] [3.10.0-1160.109.1.el7] - x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (Waiman Long) [RHEL-17703] - scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (Oleksandr Natalenko) [2224973] - scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (Oleksandr Natalenko) [2224973] - scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (Oleksandr Natalenko) [2224973]

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-3.10.0-1160.114.2.0.1.el7.src.rpm

x86_64

bpftool-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.114.2.0.1.el7.noarch.rpm kernel-debug-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.114.2.0.1.el7.noarch.rpm kernel-headers-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.114.2.0.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.114.2.0.1.el7.x86_64.rpm perf-3.10.0-1160.114.2.0.1.el7.x86_64.rpm python-perf-3.10.0-1160.114.2.0.1.el7.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2022-42896 CVE-2023-4921 CVE-2023-38409 CVE-2023-45871 CVE-2024-1086 CVE-2024-26602

Related News