Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-0059

Опубликовано: 10 янв. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-0059: kernel security update (IMPORTANT)

[5.14.0-503.21.1_5.OL9]

  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates

[5.14.0-503.21.1_5]

  • mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CKI Backport Bot) [RHEL-66899] {CVE-2024-50252}
  • CVE-2024-53122 mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (Patrick Talbert) [RHEL-70083 RHEL-69670] {CVE-2024-53122}
  • mm: make show_free_areas() static (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
  • mm: remove arguments of show_mem() (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
  • KVM: s390: Change virtual to physical address access in diag 0x258 handler (Thomas Huth) [RHEL-67922 RHEL-65229]
  • KVM: s390: gaccess: Check if guest address is in memslot (Thomas Huth) [RHEL-67922 RHEL-65229]
  • KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (Thomas Huth) [RHEL-67922 RHEL-65229]
  • s390/uv: Panic for set and remove shared access UVC errors (Thomas Huth) [RHEL-67922 RHEL-65229]
  • KVM: s390: remove useless include (Thomas Huth) [RHEL-67922 RHEL-65229]
  • s390/mm: Re-enable the shared zeropage for !PV and !skeys KVM guests (Thomas Huth) [RHEL-67922 RHEL-65229]
  • mm/userfaultfd: Do not place zeropages when zeropages are disallowed (Thomas Huth) [RHEL-67922 RHEL-65229]
  • s390: allow pte_offset_map_lock() to fail (Thomas Huth) [RHEL-67922 RHEL-54248]
  • KVM: s390: vsie: Use virt_to_phys for crypto control block (Thomas Huth) [RHEL-67922 RHEL-65229]
  • KVM: s390: vsie: Use virt_to_phys for facility control block (Thomas Huth) [RHEL-67922 RHEL-65229]
  • gfs2: Prevent inode creation race (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
  • gfs2: Only defer deletes when we have an iopen glock (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
  • gfs2: Randomize GLF_VERIFY_DELETE work delay (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Update to the evict / remote delete documentation (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Clean up delete work processing (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Minor delete_work_func cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Rename dinode_demise to evict_behavior (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Faster gfs2_upgrade_iopen_glock wakeups (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Fix unlinked inode cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Allow immediate GLF_VERIFY_DELETE work (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Initialize gl_no_formal_ino earlier (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Rename GLF_VERIFY_EVICT to GLF_VERIFY_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: make timeout values more explicit (Wolfram Sang) [RHEL-62105 RHEL-60945]
  • gfs2: Simplify function gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • gfs2: Rename SDF_DEACTIVATING to SDF_KILL (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
  • smb: client: fix use-after-free of signing key (Jay Shin) [RHEL-69306 RHEL-66206]
  • net/iucv: fix use after free in iucv_sock_close() (Mete Durlu) [RHEL-60300 RHEL-53992]
  • KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (CKI Backport Bot) [RHEL-70294]

[5.14.0-503.20.1_5]

  • bnxt_en: Add support for user configured RSS key (Michal Schmidt) [RHEL-68699 RHEL-54645]
  • bnxt_en: Add function to calculate Toeplitz hash (Michal Schmidt) [RHEL-68699 RHEL-54645]
  • kvm: Note an RCU quiescent state on guest exit (Leonardo Bras) [RHEL-65734 RHEL-20288]
  • rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full OS jitter (Leonardo Bras) [RHEL-65734 RHEL-20288]
  • context_tracking: Fix KCSAN noinstr violation (Leonardo Bras) [RHEL-65734 RHEL-20288]
  • perf/aux: Fix AUX buffer serialization (Michael Petlan) [RHEL-67495] {CVE-2024-46713}
  • RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (Mohammad Heib) [RHEL-66669 RHEL-52759] {CVE-2024-50208}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

bpftool

7.4.0-503.21.1.el9_5

kernel-tools

5.14.0-503.21.1.el9_5

kernel-tools-libs

5.14.0-503.21.1.el9_5

python3-perf

5.14.0-503.21.1.el9_5

kernel-cross-headers

5.14.0-503.21.1.el9_5

kernel-tools-libs-devel

5.14.0-503.21.1.el9_5

kernel-headers

5.14.0-503.21.1.el9_5

perf

5.14.0-503.21.1.el9_5

rtla

5.14.0-503.21.1.el9_5

rv

5.14.0-503.21.1.el9_5

Oracle Linux x86_64

bpftool

7.4.0-503.21.1.el9_5

kernel

5.14.0-503.21.1.el9_5

kernel-abi-stablelists

5.14.0-503.21.1.el9_5

kernel-core

5.14.0-503.21.1.el9_5

kernel-debug

5.14.0-503.21.1.el9_5

kernel-debug-core

5.14.0-503.21.1.el9_5

kernel-debug-modules

5.14.0-503.21.1.el9_5

kernel-debug-modules-core

5.14.0-503.21.1.el9_5

kernel-debug-modules-extra

5.14.0-503.21.1.el9_5

kernel-debug-uki-virt

5.14.0-503.21.1.el9_5

kernel-modules

5.14.0-503.21.1.el9_5

kernel-modules-core

5.14.0-503.21.1.el9_5

kernel-modules-extra

5.14.0-503.21.1.el9_5

kernel-tools

5.14.0-503.21.1.el9_5

kernel-tools-libs

5.14.0-503.21.1.el9_5

kernel-uki-virt

5.14.0-503.21.1.el9_5

kernel-uki-virt-addons

5.14.0-503.21.1.el9_5

python3-perf

5.14.0-503.21.1.el9_5

kernel-debug-devel

5.14.0-503.21.1.el9_5

kernel-debug-devel-matched

5.14.0-503.21.1.el9_5

kernel-devel

5.14.0-503.21.1.el9_5

kernel-devel-matched

5.14.0-503.21.1.el9_5

kernel-doc

5.14.0-503.21.1.el9_5

kernel-headers

5.14.0-503.21.1.el9_5

perf

5.14.0-503.21.1.el9_5

rtla

5.14.0-503.21.1.el9_5

rv

5.14.0-503.21.1.el9_5

kernel-cross-headers

5.14.0-503.21.1.el9_5

kernel-tools-libs-devel

5.14.0-503.21.1.el9_5

libperf

5.14.0-503.21.1.el9_5

Связанные уязвимости

CVSS3: 5.5
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages Avoid memory corruption while setting up Level-2 PBL pages for the non MR resources when num_pages > 256K. There will be a single PDE page address (contiguous pages in the case of > PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid memory access after 256K PBL entries in the PDE.

CVSS3: 5.5
redhat
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages Avoid memory corruption while setting up Level-2 PBL pages for the non MR resources when num_pages > 256K. There will be a single PDE page address (contiguous pages in the case of > PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid memory access after 256K PBL entries in the PDE.

CVSS3: 5.5
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages Avoid memory corruption while setting up Level-2 PBL pages for the non MR resources when num_pages > 256K. There will be a single PDE page address (contiguous pages in the case of > PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid memory access after 256K PBL entries in the PDE.

CVSS3: 5.5
msrc
6 месяцев назад

Описание отсутствует

CVSS3: 5.5
debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: R ...