Oracle Linux 10 / 9:Unbreakable Enterprise 核心 (ELSA-2026-50232)

critical Nessus Plugin ID 306779

概要

遠端 Oracle Linux 主機缺少一個或多個安全性更新。

說明

遠端 Oracle Linux 10 / 9 主機中安裝的套件受到 ELSA-2026-50232 公告中提及的多個弱點影響。

- ipv6:在 ip6_xmit() 中使用 RCU (Eric Dumazet) [Orabug: 39202432] {CVE-2025-40135}
- dst:修正 rt6_uncached_list_del() 和 rt_del_uncached_list() 中的爭用 (Eric Dumazet) [Orabug: 39202431] {CVE-2026-23004}
- netfilter:nf_tables:修正 nf_tables_addchain() 中的釋放後使用 (Inseo An) [Orabug: 39044468] {CVE-2026-23231}
- KVM:x86/mmu:即使在建立 MMIO SPTE 時,也中斷/刪除現有的 SPTE (Sean Christopherson) [Orabug: 39153394] {CVE-2026-23401}

Tenable 已直接從 Oracle Linux 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://linux.oracle.com/errata/ELSA-2026-50232.html

Plugin 詳細資訊

嚴重性: Critical

ID: 306779

檔案名稱: oraclelinux_ELSA-2026-50232.nasl

版本: 1.2

類型: Local

代理程式: unix

已發布: 2026/4/16

已更新: 2026/4/17

支援的感應器: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 7.4

CVSS v2

風險因素: Critical

基本分數: 10

時間性分數: 7.4

媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2026-23112

CVSS v3

風險因素: Critical

基本分數: 9.8

時間性分數: 8.5

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek-devel, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek-core, p-cpe:/a:oracle:linux:kernel-uek-debug-modules, p-cpe:/a:oracle:linux:kernel-uek-modules, p-cpe:/a:oracle:linux:kernel-uek-modules-extra, p-cpe:/a:oracle:linux:kernel-uek64k-core, p-cpe:/a:oracle:linux:kernel-uek64k-modules, p-cpe:/a:oracle:linux:kernel-uek64k-modules-extra, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-core, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-deprecated, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-usb, p-cpe:/a:oracle:linux:kernel-uek-modules-core, p-cpe:/a:oracle:linux:kernel-uek-modules-desktop, p-cpe:/a:oracle:linux:kernel-uek-modules-extra-netfilter, p-cpe:/a:oracle:linux:kernel-uek64k-modules-desktop, cpe:/o:oracle:linux:10, p-cpe:/a:oracle:linux:kernel-uek64k-devel, p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-tools, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-uek-debug-core, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-extra, p-cpe:/a:oracle:linux:kernel-uek64k, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-desktop, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-extra-netfilter, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-wireless, p-cpe:/a:oracle:linux:kernel-uek-modules-deprecated, p-cpe:/a:oracle:linux:kernel-uek-modules-usb, p-cpe:/a:oracle:linux:kernel-uek-modules-wireless, p-cpe:/a:oracle:linux:kernel-uek64k-modules-core, p-cpe:/a:oracle:linux:kernel-uek64k-modules-deprecated, p-cpe:/a:oracle:linux:kernel-uek64k-modules-extra-netfilter, p-cpe:/a:oracle:linux:kernel-uek64k-modules-usb, p-cpe:/a:oracle:linux:kernel-uek64k-modules-wireless

必要的 KB 項目: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2026/4/15

弱點發布日期: 2025/2/27

參考資訊

CVE: CVE-2024-58096, CVE-2024-58097, CVE-2025-21717, CVE-2025-21882, CVE-2025-37929, CVE-2025-38431, CVE-2025-39832, CVE-2025-40135, CVE-2025-68333, CVE-2025-68351, CVE-2025-68358, CVE-2025-68725, CVE-2025-68737, CVE-2025-71197, CVE-2025-71222, CVE-2025-71224, CVE-2025-71225, CVE-2025-71229, CVE-2025-71231, CVE-2025-71232, CVE-2025-71234, CVE-2025-71235, CVE-2025-71236, CVE-2025-71238, CVE-2026-23004, CVE-2026-23057, CVE-2026-23058, CVE-2026-23059, CVE-2026-23060, CVE-2026-23061, CVE-2026-23062, CVE-2026-23069, CVE-2026-23071, CVE-2026-23072, CVE-2026-23073, CVE-2026-23074, CVE-2026-23076, CVE-2026-23078, CVE-2026-23082, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087, CVE-2026-23088, CVE-2026-23089, CVE-2026-23091, CVE-2026-23095, CVE-2026-23097, CVE-2026-23099, CVE-2026-23100, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107, CVE-2026-23108, CVE-2026-23110, CVE-2026-23111, CVE-2026-23112, CVE-2026-23113, CVE-2026-23119, CVE-2026-23120, CVE-2026-23123, CVE-2026-23124, CVE-2026-23125, CVE-2026-23126, CVE-2026-23128, CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23146, CVE-2026-23148, CVE-2026-23151, CVE-2026-23154, CVE-2026-23156, CVE-2026-23159, CVE-2026-23161, CVE-2026-23163, CVE-2026-23164, CVE-2026-23166, CVE-2026-23168, CVE-2026-23173, CVE-2026-23177, CVE-2026-23178, CVE-2026-23179, CVE-2026-23188, CVE-2026-23189, CVE-2026-23190, CVE-2026-23191, CVE-2026-23193, CVE-2026-23199, CVE-2026-23200, CVE-2026-23201, CVE-2026-23202, CVE-2026-23204, CVE-2026-23205, CVE-2026-23209, CVE-2026-23212, CVE-2026-23213, CVE-2026-23214, CVE-2026-23215, CVE-2026-23216, CVE-2026-23219, CVE-2026-23223, CVE-2026-23229, CVE-2026-23230, CVE-2026-23231, CVE-2026-23237, CVE-2026-23401