Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-13589

Опубликовано: 11 авг. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-13589: kernel security update (MODERATE)

[4.18.0-553.69.1_10.OL8]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]

[4.18.0-553.69.1_10]

  • Revert 'sch_htb: make htb_qlen_notify() idempotent' (Denys Vlasenko) [RHEL-108140]
  • Revert 'sch_drr: make drr_qlen_notify() idempotent' (Denys Vlasenko) [RHEL-108140]
  • Revert 'sch_qfq: make qfq_qlen_notify() idempotent' (Denys Vlasenko) [RHEL-108140]
  • Revert 'codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()' (Denys Vlasenko) [RHEL-108140]
  • Revert 'sch_htb: make htb_deactivate() idempotent' (Denys Vlasenko) [RHEL-108140]
  • Revert 'net/sched: Always pass notifications when child class becomes empty' (Denys Vlasenko) [RHEL-108140]
  • Revert 'sch_cbq: make cbq_qlen_notify() idempotent' (Denys Vlasenko) [RHEL-108140]

[4.18.0-553.68.1_10]

  • ipv6: mcast: extend RCU protection in igmp6_send() (Hangbin Liu) [RHEL-102392] {CVE-2025-21759}
  • md/md-bitmap: move bitmap_{start, end}write to md upper layer (Nigel Croxon) [RHEL-57991]
  • md/raid5: implement pers->bitmap_sector() (Nigel Croxon) [RHEL-57991]
  • md: add a new callback pers->bitmap_sector() (Nigel Croxon) [RHEL-57991]
  • md/md-bitmap: remove the last parameter for bimtap_ops->endwrite() (Nigel Croxon) [RHEL-57991]
  • md/md-bitmap: factor behind write counters out from bitmap_{start/end}write() (Nigel Croxon) [RHEL-57991]
  • md/raid5: recheck if reshape has finished with device_lock held (Nigel Croxon) [RHEL-57991]
  • md/md-linear: enable io accounting (Nigel Croxon) [RHEL-59928]
  • md/md-multipath: enable io accounting (Nigel Croxon) [RHEL-59928]
  • md/raid10: switch to use md_account_bio() for io accounting (Nigel Croxon) [RHEL-59928]
  • md/raid1: switch to use md_account_bio() for io accounting (Nigel Croxon) [RHEL-59928]
  • raid5: fix missing io accounting in raid5_align_endio() (Nigel Croxon) [RHEL-59928]
  • md: also clone new io if io accounting is disabled (Nigel Croxon) [RHEL-59928]
  • sch_cbq: make cbq_qlen_notify() idempotent (Ivan Vecera) [RHEL-93376]
  • net/sched: Always pass notifications when child class becomes empty (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • sch_htb: make htb_deactivate() idempotent (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • sch_qfq: make qfq_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • sch_drr: make drr_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • sch_htb: make htb_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93376] {CVE-2025-38350}
  • can: peak_usb: fix use after free bugs (CKI Backport Bot) [RHEL-99447] {CVE-2021-47670}
  • wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CKI Backport Bot) [RHEL-103141] {CVE-2025-38159}
  • net/ipv6: release expired exception dst cached in socket (Guillaume Nault) [RHEL-105794] {CVE-2024-56644}

[4.18.0-553.67.1_10]

  • mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (Rafael Aquini) [RHEL-101233] {CVE-2025-38085}
  • mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (Rafael Aquini) [RHEL-101233] {CVE-2025-38085}
  • mm/khugepaged: fix GUP-fast interaction by sending IPI (Rafael Aquini) [RHEL-101233] {CVE-2025-38085}
  • mm/khugepaged: take the right locks for page table retraction (Rafael Aquini) [RHEL-101233] {CVE-2025-38085}
  • mm/khugepaged: unify collapse pmd clear, flush and free (Rafael Aquini) [RHEL-101233] {CVE-2025-38085}
  • padata: fix UAF in padata_reorder (Waiman Long) [RHEL-101398] {CVE-2025-21727}
  • redhat: update BUILD_TARGET to rhel-8.10.0-z-test-pesign (Jan Stancek)
  • ftrace: Clean up hash direct_functions on register failures (Gregory Bell) [RHEL-103912]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-tools-libs-devel

4.18.0-553.69.1.el8_10

bpftool

4.18.0-553.69.1.el8_10

kernel-cross-headers

4.18.0-553.69.1.el8_10

kernel-headers

4.18.0-553.69.1.el8_10

kernel-tools

4.18.0-553.69.1.el8_10

kernel-tools-libs

4.18.0-553.69.1.el8_10

perf

4.18.0-553.69.1.el8_10

python3-perf

4.18.0-553.69.1.el8_10

Oracle Linux x86_64

kernel-tools-libs-devel

4.18.0-553.69.1.el8_10

bpftool

4.18.0-553.69.1.el8_10

kernel

4.18.0-553.69.1.el8_10

kernel-abi-stablelists

4.18.0-553.69.1.el8_10

kernel-core

4.18.0-553.69.1.el8_10

kernel-cross-headers

4.18.0-553.69.1.el8_10

kernel-debug

4.18.0-553.69.1.el8_10

kernel-debug-core

4.18.0-553.69.1.el8_10

kernel-debug-devel

4.18.0-553.69.1.el8_10

kernel-debug-modules

4.18.0-553.69.1.el8_10

kernel-debug-modules-extra

4.18.0-553.69.1.el8_10

kernel-devel

4.18.0-553.69.1.el8_10

kernel-doc

4.18.0-553.69.1.el8_10

kernel-headers

4.18.0-553.69.1.el8_10

kernel-modules

4.18.0-553.69.1.el8_10

kernel-modules-extra

4.18.0-553.69.1.el8_10

kernel-tools

4.18.0-553.69.1.el8_10

kernel-tools-libs

4.18.0-553.69.1.el8_10

perf

4.18.0-553.69.1.el8_10

python3-perf

4.18.0-553.69.1.el8_10

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.

CVSS3: 7
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.

CVSS3: 7.8
nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.

CVSS3: 7.8
debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 7.8
github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.