Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-10837

Опубликовано: 15 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-10837: kernel security update (MODERATE)

[5.14.0-570.26.1.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.26.1_6]

  • x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CKI Backport Bot) [RHEL-98996] {CVE-2025-21991}
  • cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (David Arcari) [RHEL-90212]
  • smb: client: fix perf regression with deferred closes (Paulo Alcantara) [RHEL-97482]
  • smb3 client: fix open hardlink on deferred close file error (Paulo Alcantara) [RHEL-97482]
  • Fix mmu notifiers for range-based invalidates (Jay Shin) [RHEL-93743]
  • vfio/pci: Align huge faults to order (Alex Williamson) [RHEL-88275]
  • vfio/type1: Use mapping page mask for pfnmaps (Alex Williamson) [RHEL-88275]
  • mm: Provide address mask in struct follow_pfnmap_args (Alex Williamson) [RHEL-88275]
  • vfio/type1: Use consistent types for page counts (Alex Williamson) [RHEL-88275]
  • vfio/type1: Use vfio_batch for vaddr_get_pfns() (Alex Williamson) [RHEL-88275]
  • vfio/type1: Convert all vaddr_get_pfns() callers to use vfio_batch (Alex Williamson) [RHEL-88275]
  • vfio/type1: Catch zero from pin_user_pages_remote() (Alex Williamson) [RHEL-88275]
  • vfio/pci: Fallback huge faults for unaligned pfn (Donald Dutile) [RHEL-85623]
  • vfio/pci: implement huge_fault support (Donald Dutile) [RHEL-85623]
  • vfio/pci: Remove unused struct 'vfio_pci_mmap_vma' (Donald Dutile) [RHEL-85623]
  • vfio/pci: Insert full vma on mmap'd MMIO fault (Donald Dutile) [RHEL-85623]
  • vfio/pci: Use unmap_mapping_range() (Donald Dutile) [RHEL-85623]
  • mm/arm64: support large pfn mappings (Donald Dutile) [RHEL-85623]
  • mm/x86: support large pfn mappings (Donald Dutile) [RHEL-85623]
  • mm: remove follow_pte() (Donald Dutile) [RHEL-85623]
  • mm: follow_pte() improvements (Donald Dutile) [RHEL-85623]
  • mm/access_process_vm: use the new follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • vfio: use the new follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • mm/x86/pat: use the new follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • s390/pci_mmio: use follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • KVM: use follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • mm: pass VMA instead of MM to follow_pte() (Donald Dutile) [RHEL-85623]
  • mm: move follow_phys to arch/x86/mm/pat/memtype.c (Donald Dutile) [RHEL-85623]
  • mm: fix follow_pfnmap API lockdep assert (Donald Dutile) [RHEL-85623]
  • mm: new follow_pfnmap API (Donald Dutile) [RHEL-85623]
  • mm: remove follow_pfn (Donald Dutile) [RHEL-85623]
  • mm: always define pxx_pgprot() (Donald Dutile) [RHEL-85623]
  • mm/huge_memory: check pmd_special() only after pmd_present() (Donald Dutile) [RHEL-85623]
  • mm/fork: accept huge pfnmap entries (Donald Dutile) [RHEL-85623]
  • mm/pagewalk: check pfnmap for folio_walk_start() (Donald Dutile) [RHEL-85623]
  • mm/gup: detect huge pfnmap entries in gup-fast (Donald Dutile) [RHEL-85623]
  • mm: mark special bits for huge pfn mappings when inject (Donald Dutile) [RHEL-85623]
  • mm: drop is_huge_zero_pud() (Donald Dutile) [RHEL-85623]
  • mm: introduce ARCH_SUPPORTS_HUGE_PFNMAP and special bits to pmd/pud (Donald Dutile) [RHEL-85623]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.26.1.0.1.el9_6

kernel-headers

5.14.0-570.26.1.0.1.el9_6

kernel-tools

5.14.0-570.26.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.26.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.26.1.0.1.el9_6

perf

5.14.0-570.26.1.0.1.el9_6

python3-perf

5.14.0-570.26.1.0.1.el9_6

rtla

5.14.0-570.26.1.0.1.el9_6

rv

5.14.0-570.26.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.26.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.26.1.0.1.el9_6

kernel-core

5.14.0-570.26.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.26.1.0.1.el9_6

kernel-debug

5.14.0-570.26.1.0.1.el9_6

kernel-debug-core

5.14.0-570.26.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.26.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.26.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.26.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.26.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.26.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.26.1.0.1.el9_6

kernel-devel

5.14.0-570.26.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.26.1.0.1.el9_6

kernel-doc

5.14.0-570.26.1.0.1.el9_6

kernel-headers

5.14.0-570.26.1.0.1.el9_6

kernel-modules

5.14.0-570.26.1.0.1.el9_6

kernel-modules-core

5.14.0-570.26.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.26.1.0.1.el9_6

kernel-tools

5.14.0-570.26.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.26.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.26.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.26.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.26.1.0.1.el9_6

libperf

5.14.0-570.26.1.0.1.el9_6

perf

5.14.0-570.26.1.0.1.el9_6

python3-perf

5.14.0-570.26.1.0.1.el9_6

rtla

5.14.0-570.26.1.0.1.el9_6

rv

5.14.0-570.26.1.0.1.el9_6

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask. According to Documentation/admin-guide/mm/numaperf.rst: "Some memory may share the same node as a CPU, and others are provided as memory only nodes." Therefore, some node CPU masks may be empty and wouldn't have a "first CPU". On a machine with far memory (and therefore CPU-less NUMA nodes): - cpumask_of_node(nid) is 0 - cpumask_first(0) is CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an index that is 1 out of bounds This does not have any security implications since flashing microcode is a privileged operation but I believe this has reliability implications by potentially corrupting memory while flashing a microcode update. When booting with...

CVSS3: 6.7
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask. According to Documentation/admin-guide/mm/numaperf.rst: "Some memory may share the same node as a CPU, and others are provided as memory only nodes." Therefore, some node CPU masks may be empty and wouldn't have a "first CPU". On a machine with far memory (and therefore CPU-less NUMA nodes): - cpumask_of_node(nid) is 0 - cpumask_first(0) is CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an index that is 1 out of bounds This does not have any security implications since flashing microcode is a privileged operation but I believe this has reliability implications by potentially corrupting memory while flashing a microcode update. When booting with CONFIG_...

CVSS3: 7.8
nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask. According to Documentation/admin-guide/mm/numaperf.rst: "Some memory may share the same node as a CPU, and others are provided as memory only nodes." Therefore, some node CPU masks may be empty and wouldn't have a "first CPU". On a machine with far memory (and therefore CPU-less NUMA nodes): - cpumask_of_node(nid) is 0 - cpumask_first(0) is CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an index that is 1 out of bounds This does not have any security implications since flashing microcode is a privileged operation but I believe this has reliability implications by potentially corrupting memory while flashing a microcode update. When booting w

CVSS3: 7.8
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x ...