Oracle Linux Security
You can securely use Oracle Linux in your cloud environment by following these security best practices. Oracle Linux also provides several cloud services that perform automatic software updates, install bug fixes, and monitor your instances for critical events.
Security Best Practices
Follow these security best practices when using Oracle Linux in a cloud environment.
For more information, see Oracle Linux 9 Enhancing System Security and Oracle Linux 8 Enhancing System Security.
Best Practice |
Description |
---|---|
Minimize and secure the software footprint |
Uninstall or disable components, services, and features that you don't need or use in your cloud environment. As an option, consider installing only the base OS on Oracle Linux systems. If you use the Oracle Cloud platform image, choose the best image type to meet your business needs:
Regularly review the packages that are part of your Oracle Cloud platform image to ensure the packages are actively being used. Remove packages that aren't used. |
Keep software up-to-date |
Evaluate the software installed on the Oracle Linux systems in your environment, and apply security updates on a weekly basis, at minimum. Regularly check for patch updates and install the latest patches. Determine when, and how often, to perform larger updates that include additional bug fixes and enhancements. Use these Oracle Linux cloud services to help keep software up-to-date:
|
Restrict access |
Keep middle-tier applications and databases behind a firewall or restrict access by IP address. If using a firewall, make sure the firewall settings are controlled, and regularly review these settings. If using a virtual firewall, set up the proper security lists for your instances. See Ways to Secure Your Network and Security Lists. |
Control authentication mechanisms and enforce strict password restrictions |
Use strict password, key, certificate, and token-based authentication. |
Grant minimal user privileges |
Limit user privileges as much as possible. Give users only the access required to perform their work. |
Monitor system activity |
Audit and review system audit records. Ksplice provides a known exploit detection feature for systems that have the Ksplice Enhanced client installed. For more information, see the Ksplice User Guide. |
Keep up-to-date with the latest security information |
Monitor the Oracle Linux Security mailing list for critical security announcements. See Subscribe to Oracle Security Alerts. |
For government security standards and requirements, use the STIG image |
Use the Oracle Linux STIG image to create Oracle Linux instances that follow certain security standards and requirements set by the Defense Information Systems Agency (DISA). These security standards are described in the Security Technical Implementation Guide (STIG). For more information, see What is STIG?. |
There are additional services in Oracle Cloud that complement the security you can build with Oracle Linux. For example, to regularly check hosts and container images for potential security vulnerabilities, you can use the Oracle Cloud Infrastructure Vulnerability Scanning Service. For assistance with managing application stacks, including grouping resources based on defined criteria, you can use the Oracle Fleet Application Management Service.
See Vulnerability Scanning Overview and Overview of Fleet Application Management.
Oracle Linux Services for Security
Oracle Linux provides several services that help you to secure Oracle Linux instances in your cloud environment.
Oracle Autonomous Linux Service
Autonomous Linux performs automatic daily security updates on your Oracle Linux instances, and monitors the instances for critical events.
For more information, see Overview of Autonomous Linux.
Security Features
Feature |
Description |
---|---|
Instances that use the Oracle Autonomous Linux image are automatically updated daily with available packages and patches that address security vulnerabilities. Some of these updates can include zero-downtime Ksplice patches for kernel, OpenSSL, and glibc libraries. You can modify the execution time of these daily updates. |
|
View filterable reports that list security advisories for your instances and indicate whether your instances are up-to-date on security patches. |
|
If an exploit detection event occurs on an instance, review the event details, its log files, and stack trace information about the event. |
|
Choose to be notified when a security event occurs on an instance. You do so by setting the notification topic for the instance. |
OS Management Hub Service
OS Management Hub lets you monitor and manage updates across the Oracle Linux instances in your cloud environment from a centralized management console.
For more information, see Overview of OS Management Hub.
Security Features
Feature |
Description |
---|---|
Use policies and groups to limit access to users and cloud resources. |
|
Control the number of software sources (repositories), and specify which software packages are available to the instances registered with OS Management Hub. |
|
Jobs that schedule patching updates for a standalone instance or all standalone instances in a compartment |
Create jobs that schedule recurring security updates for your instance, or instances. You can create jobs that apply Ksplice updates. |
Mirror sync jobs that sync mirrored software sources |
Designate an instance to be a management station. You can then create jobs that ensure the management station distributes the latest software and security packages to any instances using that station. |
Review reports that provide information about security updates, bug updates, and instance activity. |
Oracle Ksplice Service
Oracle Ksplice provides automatic security patch and updates to your Oracle Linux instances without needing to shut down and restart the instances.
For more information about Ksplice, see Oracle Linux: Ksplice User's Guide.
Security Features
Feature |
Description |
---|---|
Ksplice automatically installs the latest security patches and updates to Linux kernels on your instances, and with zero downtime. |
|
View the patches and updates currently installed on your instances. |
|
If you don't want automatic updates, manually install the latest patches and updates to your instances on demand. |
|
View which kernels are actively maintained by Ksplice. |
Installing Security Updates Using DNF
Use DNF to only install security updates rather than applying all available package updates to an Oracle Linux instance on Oracle Cloud Infrastructure.
- To view security updates
- Complete the following steps to view security updates for an Oracle Linux instance.
- From a command line, using administrative privileges connect to the instance using SSH.
- List the available errata which includes security updates:
sudo dnf updateinfo list
The output shows advisories by type: security (ELSA), bug fixes (ELBA), and feature enhancements (ELEA). Security advisories are identified by a severity level followed by
/Sec.
, where severity can beCritical
,Important
,Moderate
, orLow
. For example:... ELSA-2025-9080 Important/Sec. kernel-5.14.0-570.22.1.0.1.el9_6.x86_64 ELSA-2025-9302 Moderate/Sec. kernel-5.14.0-570.23.1.0.1.el9_6.x86_64 ... ELSA-2025-9080 Important/Sec. kernel-modules-5.14.0-570.22.1.0.1.el9_6.x86_64 ELSA-2025-9302 Moderate/Sec. kernel-modules-5.14.0-570.23.1.0.1.el9_6.x86_64 ... ELBA-2025-9428 bugfix kpartx-0.8.7-35.el9_6.1.x86_64 ELEA-2025-7281 enhancement mysql-8.4.4-1.module+el9.6.0+90539+da437dfb.x86_64 ... ELSA-2025-9327 Important/Sec. libblockdev-loop-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-mdraid-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-part-2.28-14.0.1.el9_6.x86_64 ...
- Use the
security
argument to list only the security errata, for example:sudo dnf updateinfo list security
... ELSA-2025-9080 Important/Sec. kernel-5.14.0-570.22.1.0.1.el9_6.x86_64 ELSA-2025-9302 Moderate/Sec. kernel-5.14.0-570.23.1.0.1.el9_6.x86_64 ... ELSA-2025-9080 Important/Sec. kernel-modules-5.14.0-570.22.1.0.1.el9_6.x86_64 ELSA-2025-9302 Moderate/Sec. kernel-modules-5.14.0-570.23.1.0.1.el9_6.x86_64 ... ELSA-2025-9327 Important/Sec. libblockdev-loop-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-mdraid-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-part-2.28-14.0.1.el9_6.x86_64 ...
- Filter the list in any of the following ways:
- Use the
--sec-severity=Severity
option to filter the security errata by severity, for example:sudo dnf updateinfo list --sec-severity=Important
... ELSA-2025-9080 Important/Sec. kernel-5.14.0-570.22.1.0.1.el9_6.x86_64 ... ELSA-2025-9080 Important/Sec. kernel-modules-5.14.0-570.22.1.0.1.el9_6.x86_64 ... ELSA-2025-9327 Important/Sec. libblockdev-loop-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-mdraid-2.28-14.0.1.el9_6.x86_64 ELSA-2025-9327 Important/Sec. libblockdev-part-2.28-14.0.1.el9_6.x86_64 ...
- Use the
cves
argument to list the security errata by their Common Vulnerabilities and Exposures (CVE) IDs, for example:sudo dnf updateinfo list cves
... CVE-2024-57801 Important/Sec. kernel-uek-modules-wireless-6.12.0-101.33.4.3.el9uek.x86_64 CVE-2024-57839 Important/Sec. kernel-uek-modules-wireless-6.12.0-101.33.4.3.el9uek.x86_64 CVE-2024-57841 Important/Sec. kernel-uek-modules-wireless-6.12.0-101.33.4.3.el9uek.x86_64 ... CVE-2025-22126 Important/Sec. perf-5.14.0-570.22.1.0.1.el9_6.x86_64 CVE-2025-21979 Important/Sec. perf-5.14.0-570.22.1.0.1.el9_6.x86_64 CVE-2025-21963 Important/Sec. perf-5.14.0-570.22.1.0.1.el9_6.x86_64 ... CVE-2025-21919 Moderate/Sec. python3-perf-5.14.0-570.23.1.0.1.el9_6.x86_64 CVE-2025-21883 Moderate/Sec. python3-perf-5.14.0-570.23.1.0.1.el9_6.x86_64 CVE-2025-23150 Moderate/Sec. python3-perf-5.14.0-570.23.1.0.1.el9_6.x86_64 CVE-2025-22104 Moderate/Sec. python3-perf-5.14.0-570.23.1.0.1.el9_6.x86_64 ...
-
Use the
--cve CVE-ID
option to view the security errata that corresponds to a specific CVE ID, for example:sudo dnf updateinfo list --cve CVE-2025-32462
ELSA-2025-9978 Important/Sec. sudo-1.9.5p2-10.el9_6.1.x86_64
-
Use the
info
argument and the--cve CVE-ID
option to view details about a CVE, for example:sudo dnf updateinfo info --cve CVE-2025-32462
=============================================================================== sudo security update =============================================================================== Update ID: ELSA-2025-9978 Type: security Updated: 2025-06-30 00:00:00 CVEs: CVE-2025-32462 Description: [1.9.5p2-10.1] : RHEL 9.6.0.Z ERRATUM : - CVE-2025-32462 sudo: LPE via host option : Resolves: RHEL-100016 Severity: Important
- Use the
- To install security updates
- Use any of the following options to install security updates on an Oracle Linux instance.
- Update all packages that have security errata available using
upgrade --security
. All packages are updated to their latest versions, and the latest versions might include bug fixes or new features and not security errata.sudo dnf upgrade --security
- Update all packages to the latest versions that contain security errata using
upgrade-minimal --security
. If there are newer packages that don't contain security errata, they are ignored.sudo dnf upgrade-minimal --security
- Update specific packages to the latest versions that contain security errata using
upgrade-minimal package* --security
. For example, to only update kernel packages, run:sudo dnf upgrade-minimal kernel* --security
- Update only those packages that correspond to a CVE using
upgrade --cve
.sudo dnf upgrade --cve CVE-ID
- Update a specific ELSA using
upgrade --advisory
.sudo dnf upgrade --advisory ELSA-ID
Note
Some updates might require that you reboot the system. By default, the boot manager automatically enables the most recent kernel version. - Update all packages that have security errata available using