Описание
ELSA-2025-10379: kernel security update (IMPORTANT)
[5.14.0-570.25.1.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-570.25.1_6]
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CKI Backport Bot) [RHEL-99124] {CVE-2022-49846}
- vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CKI Backport Bot) [RHEL-97110] {CVE-2025-37799}
- NFSv4: Don't check for OPEN feature support in v4.1 (Scott Mayhew) [RHEL-95252]
- ipv6: mcast: extend RCU protection in igmp6_send() (CKI Backport Bot) [RHEL-94673] {CVE-2025-21759}
- ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CKI Backport Bot) [RHEL-93445] {CVE-2025-21887}
- net: atm: fix use after free in lec_send() (CKI Backport Bot) [RHEL-93132] {CVE-2025-22004}
- block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (Ming Lei) [RHEL-92268]
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.25.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.25.1.0.1.el9_6
kernel-headers
5.14.0-570.25.1.0.1.el9_6
perf
5.14.0-570.25.1.0.1.el9_6
rtla
5.14.0-570.25.1.0.1.el9_6
rv
5.14.0-570.25.1.0.1.el9_6
kernel-tools
5.14.0-570.25.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.25.1.0.1.el9_6
python3-perf
5.14.0-570.25.1.0.1.el9_6
Oracle Linux x86_64
kernel
5.14.0-570.25.1.0.1.el9_6
kernel-debug
5.14.0-570.25.1.0.1.el9_6
kernel-debug-core
5.14.0-570.25.1.0.1.el9_6
kernel-debug-modules
5.14.0-570.25.1.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.25.1.0.1.el9_6
kernel-modules-core
5.14.0-570.25.1.0.1.el9_6
kernel-tools
5.14.0-570.25.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.25.1.0.1.el9_6
kernel-uki-virt
5.14.0-570.25.1.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.25.1.0.1.el9_6
python3-perf
5.14.0-570.25.1.0.1.el9_6
kernel-debug-devel
5.14.0-570.25.1.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.25.1.0.1.el9_6
kernel-devel
5.14.0-570.25.1.0.1.el9_6
kernel-devel-matched
5.14.0-570.25.1.0.1.el9_6
kernel-doc
5.14.0-570.25.1.0.1.el9_6
kernel-headers
5.14.0-570.25.1.0.1.el9_6
perf
5.14.0-570.25.1.0.1.el9_6
rtla
5.14.0-570.25.1.0.1.el9_6
rv
5.14.0-570.25.1.0.1.el9_6
kernel-cross-headers
5.14.0-570.25.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.25.1.0.1.el9_6
libperf
5.14.0-570.25.1.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.25.1.0.1.el9_6
kernel-core
5.14.0-570.25.1.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.25.1.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.25.1.0.1.el9_6
kernel-modules
5.14.0-570.25.1.0.1.el9_6
kernel-modules-extra
5.14.0-570.25.1.0.1.el9_6
Ссылки на источники
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called without RTNL or RCU being held. Extend RCU protection so that we can safely fetch the net pointer and avoid a potential UAF. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.