Oracle Linux Security Advisory ELSA-2024-12255

https://linux.oracle.com/errata/ELSA-2024-12255.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-core-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-debug-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-debug-core-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-debug-devel-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-debug-modules-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-debug-modules-extra-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-devel-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-doc-5.15.0-204.147.6.3.el9uek.noarch.rpm
kernel-uek-modules-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-modules-extra-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-container-5.15.0-204.147.6.3.el9uek.x86_64.rpm
kernel-uek-container-debug-5.15.0-204.147.6.3.el9uek.x86_64.rpm



SRPMS:
https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-uek-5.15.0-204.147.6.3.el9uek.src.rpm

Related CVEs:

CVE-2024-1086




Description of changes:

[5.15.0-204.147.6.3.el9uek]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal)  [Orabug: 36464807]  {CVE-2024-1086}


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2024-12255: kernel Important Security Update

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Summary

[5.15.0-204.147.6.3.el9uek] - netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [Orabug: 36464807] {CVE-2024-1086}

SRPMs

https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-uek-5.15.0-204.147.6.3.el9uek.src.rpm

x86_64

bpftool-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-core-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-debug-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-debug-core-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-debug-devel-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-debug-modules-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-debug-modules-extra-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-devel-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-doc-5.15.0-204.147.6.3.el9uek.noarch.rpm kernel-uek-modules-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-modules-extra-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-container-5.15.0-204.147.6.3.el9uek.x86_64.rpm kernel-uek-container-debug-5.15.0-204.147.6.3.el9uek.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2024-1086

Related News