Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-11861

Опубликовано: 29 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-11861: kernel security update (MODERATE)

[5.14.0-570.30.1.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.30.1_6]

  • net_sched: hfsc: Fix a UAF vulnerability in class handling (Davide Caratti) [RHEL-95853] {CVE-2025-37797}

[5.14.0-570.29.1_6]

  • tcp: adjust rcvq_space after updating scaling ratio (Guillaume Nault) [RHEL-99145]
  • ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CKI Backport Bot) [RHEL-93555] {CVE-2025-22121}
  • ext4: introduce ITAIL helper (CKI Backport Bot) [RHEL-93555] {CVE-2025-22121}
  • ext4: avoid journaling sb update on error if journal is destroying (Brian Foster) [RHEL-93591] {CVE-2025-22113}
  • ext4: define ext4_journal_destroy wrapper (Brian Foster) [RHEL-93591]
  • net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CKI Backport Bot) [RHEL-102093] {CVE-2025-38110}
  • smb: client: fix regression with native SMB symlinks (Paulo Alcantara) [RHEL-101953]
  • redhat/configs: remove automotive directory (Eric Chanudet) [RHEL-96365]
  • r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (CKI Backport Bot) [RHEL-96715]
  • r8169: disable RTL8126 ZRX-DC timeout (CKI Backport Bot) [RHEL-96715]
  • net: ch9200: fix uninitialised access during mii_nway_restart (CKI Backport Bot) [RHEL-101212] {CVE-2025-38086}
  • media: uvcvideo: Fix double free in error path (CKI Backport Bot) [RHEL-98795] {CVE-2024-57980}
  • RDMA/mlx5: Fix page_size variable overflow (CKI Backport Bot) [RHEL-99320] {CVE-2025-22091}
  • wifi: iwlwifi: limit printed string from FW file (CKI Backport Bot) [RHEL-99384] {CVE-2025-21905}
  • RDMA/core: Fix use-after-free when rename device name (CKI Backport Bot) [RHEL-99048] {CVE-2025-22085}
  • octeon_ep: Fix host hang issue during device reboot (CKI Backport Bot) [RHEL-93251]
  • mm/huge_memory: fix dereferencing invalid pmd migration entry (Rafael Aquini) [RHEL-96368] {CVE-2025-37958}
  • octeon_ep_vf: Resolve netdevice usage count issue (CKI Backport Bot) [RHEL-93252]
  • s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues (CKI Backport Bot) [RHEL-87555]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.30.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.30.1.0.1.el9_6

kernel-headers

5.14.0-570.30.1.0.1.el9_6

perf

5.14.0-570.30.1.0.1.el9_6

rtla

5.14.0-570.30.1.0.1.el9_6

rv

5.14.0-570.30.1.0.1.el9_6

kernel-tools

5.14.0-570.30.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.30.1.0.1.el9_6

python3-perf

5.14.0-570.30.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.30.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.30.1.0.1.el9_6

kernel-core

5.14.0-570.30.1.0.1.el9_6

kernel-debug

5.14.0-570.30.1.0.1.el9_6

kernel-debug-core

5.14.0-570.30.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.30.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.30.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.30.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.30.1.0.1.el9_6

kernel-modules

5.14.0-570.30.1.0.1.el9_6

kernel-modules-core

5.14.0-570.30.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.30.1.0.1.el9_6

kernel-tools

5.14.0-570.30.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.30.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.30.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.30.1.0.1.el9_6

python3-perf

5.14.0-570.30.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.30.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.30.1.0.1.el9_6

kernel-devel

5.14.0-570.30.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.30.1.0.1.el9_6

kernel-doc

5.14.0-570.30.1.0.1.el9_6

kernel-headers

5.14.0-570.30.1.0.1.el9_6

perf

5.14.0-570.30.1.0.1.el9_6

rtla

5.14.0-570.30.1.0.1.el9_6

rv

5.14.0-570.30.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.30.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.30.1.0.1.el9_6

libperf

5.14.0-570.30.1.0.1.el9_6

Связанные уязвимости

CVSS3: 7.1
ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.

CVSS3: 6
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.

CVSS3: 7.1
nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.

CVSS3: 7.1
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.1
debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: w ...