OVMSA-2024-0004

OVMSA-2024-0004 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2024-04-03

Description


[4.1.12-124.84.2]
- netfilter: nf_tables: reject QUEUE/DROP verdict parameters (Florian Westphal) [Orabug: 36251327] {CVE-2024-1086}

[4.1.12-124.84.1]
- mm: avoid conflict between MADV_DOEXEC and upstream advice values (Anthony Yznaga) [Orabug: 36334311]
- kobject: Fix slab-out-of-bounds in fill_kobj_path() (Wang Hai) [Orabug: 35924076] {CVE-2023-45863}
- kobject: Replace strncpy with memcpy (Guenter Roeck) [Orabug: 35924076]
- net: xfrm: Fix xfrm_address_filter OOB read (Lin Ma) [Orabug: 35923517] {CVE-2023-39194}
- net/xfrm: use kmemdup rather than duplicating its implementation (Andrzej Hajda) [Orabug: 35923517]


Related CVEs


CVE-2023-45863
CVE-2023-39194
CVE-2024-1086

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3 (x86_64) kernel-uek-4.1.12-124.84.2.el6uek.src.rpm23b00db6358f2610ce70d27313be821c515db82c70a38cb092a096adb7859411OVMSA-2025-0001ovm3_x86_64_ELS
kernel-uek-4.1.12-124.84.2.el6uek.x86_64.rpm2cdb633d62101fd372e3485155f34e892659ad883cd2d0812d7513941f9113b8OVMSA-2025-0001ovm3_x86_64_ELS
kernel-uek-firmware-4.1.12-124.84.2.el6uek.noarch.rpma4c42e3216efa783d4de315f6f1814daa0ea02c89e2a3cf0c7e0174e88f1fe49OVMSA-2025-0001ovm3_x86_64_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete