Oracle Linux Security Advisory ELSA-2024-12149

https://linux.oracle.com/errata/ELSA-2024-12149.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-7.2.0-362.18.0.2.el9_3.x86_64.rpm
kernel-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-abi-stablelists-5.14.0-362.18.0.2.el9_3.noarch.rpm
kernel-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-modules-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-modules-extra-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-modules-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-modules-extra-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-tools-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-tools-libs-5.14.0-362.18.0.2.el9_3.x86_64.rpm
python3-perf-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-devel-matched-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-devel-matched-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-doc-5.14.0-362.18.0.2.el9_3.noarch.rpm
kernel-headers-5.14.0-362.18.0.2.el9_3.x86_64.rpm
perf-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-cross-headers-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-tools-libs-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm
libperf-5.14.0-362.18.0.2.el9_3.x86_64.rpm
rtla-5.14.0-362.18.0.2.el9_3.x86_64.rpm
rv-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-debug-modules-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm
kernel-modules-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm

aarch64:
bpftool-7.2.0-362.18.0.2.el9_3.aarch64.rpm
kernel-tools-5.14.0-362.18.0.2.el9_3.aarch64.rpm
kernel-tools-libs-5.14.0-362.18.0.2.el9_3.aarch64.rpm
python3-perf-5.14.0-362.18.0.2.el9_3.aarch64.rpm
kernel-headers-5.14.0-362.18.0.2.el9_3.aarch64.rpm
perf-5.14.0-362.18.0.2.el9_3.aarch64.rpm
kernel-cross-headers-5.14.0-362.18.0.2.el9_3.aarch64.rpm
kernel-tools-libs-devel-5.14.0-362.18.0.2.el9_3.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-5.14.0-362.18.0.2.el9_3.src.rpm

Related CVEs:

CVE-2023-4623
CVE-2023-6679




Description of changes:

[5.14.0-362.18.0.2]
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623}
- dpll: core: Add DPLL framework base functions {CVE-2023-6679}
- dpll: spec: Add Netlink spec in YAML {CVE-2023-6679}
- dpll: netlink: Add DPLL framework base functions {CVE-2023-6679}
- netdev: expose DPLL pin handle for netdevice {CVE-2023-6679}
- netdev: Remove unneeded semicolon {CVE-2023-6679}
- dpll: netlink/core: add support for pin-dpll signal phase offset/adjust {CVE-2023-6679}
- dpll: netlink/core: change pin frequency set behavior {CVE-2023-6679}
- dpll: Fix potential msg memleak when genlmsg_put_reply failed {CVE-2023-6679}
- dpll: sanitize possible null pointer dereference in dpll_pin_parent_pin_set() {CVE-2023-6679}


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2024-12149: kernel security Important Security Update

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Summary

[5.14.0-362.18.0.2] - net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623} - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623} - dpll: core: Add DPLL framework base functions {CVE-2023-6679} - dpll: spec: Add Netlink spec in YAML {CVE-2023-6679} - dpll: netlink: Add DPLL framework base functions {CVE-2023-6679} - netdev: expose DPLL pin handle for netdevice {CVE-2023-6679} - netdev: Remove unneeded semicolon {CVE-2023-6679} - dpll: netlink/core: add support for pin-dpll signal phase offset/adjust {CVE-2023-6679} - dpll: netlink/core: change pin frequency set behavior {CVE-2023-6679} - dpll: Fix potential msg memleak when genlmsg_put_reply failed {CVE-2023-6679} - dpll: sanitize possible null pointer dereference in dpll_pin_parent_pin_set() {CVE-2023-6679}

SRPMs

https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-5.14.0-362.18.0.2.el9_3.src.rpm

x86_64

bpftool-7.2.0-362.18.0.2.el9_3.x86_64.rpm kernel-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-abi-stablelists-5.14.0-362.18.0.2.el9_3.noarch.rpm kernel-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-modules-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-modules-extra-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-modules-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-modules-extra-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-tools-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-tools-libs-5.14.0-362.18.0.2.el9_3.x86_64.rpm python3-perf-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-devel-matched-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-devel-matched-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-doc-5.14.0-362.18.0.2.el9_3.noarch.rpm kernel-headers-5.14.0-362.18.0.2.el9_3.x86_64.rpm perf-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-cross-headers-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-tools-libs-devel-5.14.0-362.18.0.2.el9_3.x86_64.rpm libperf-5.14.0-362.18.0.2.el9_3.x86_64.rpm rtla-5.14.0-362.18.0.2.el9_3.x86_64.rpm rv-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-debug-modules-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm kernel-modules-core-5.14.0-362.18.0.2.el9_3.x86_64.rpm

aarch64

bpftool-7.2.0-362.18.0.2.el9_3.aarch64.rpm kernel-tools-5.14.0-362.18.0.2.el9_3.aarch64.rpm kernel-tools-libs-5.14.0-362.18.0.2.el9_3.aarch64.rpm python3-perf-5.14.0-362.18.0.2.el9_3.aarch64.rpm kernel-headers-5.14.0-362.18.0.2.el9_3.aarch64.rpm perf-5.14.0-362.18.0.2.el9_3.aarch64.rpm kernel-cross-headers-5.14.0-362.18.0.2.el9_3.aarch64.rpm kernel-tools-libs-devel-5.14.0-362.18.0.2.el9_3.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-4623 CVE-2023-6679

Related News