Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-13602

Опубликовано: 13 авг. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-13602: kernel security update (MODERATE)

[5.14.0-570.33.2.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.33.2_6]

  • Revert 'sch_htb: make htb_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
  • Revert 'sch_drr: make drr_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
  • Revert 'sch_qfq: make qfq_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
  • Revert 'codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()' (Patrick Talbert) [RHEL-108138]
  • Revert 'sch_htb: make htb_deactivate() idempotent' (Patrick Talbert) [RHEL-108138]
  • Revert 'net/sched: Always pass notifications when child class becomes empty' (Patrick Talbert) [RHEL-108138]

[5.14.0-570.33.1_6]

  • net/sched: Always pass notifications when child class becomes empty (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • sch_htb: make htb_deactivate() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • sch_qfq: make qfq_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • sch_drr: make drr_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • sch_htb: make htb_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
  • redhat: update BUILD_TARGET to rhel-9.6.0-z-test-pesign (Jan Stancek)
  • PCI: Use downstream bridges for distributing resources (Jennifer Berringer) [RHEL-102666]
  • PCI/ACS: Fix 'pci=config_acs=' parameter (Charles Mirabile) [RHEL-102652]
  • PCI: Fix pci_enable_acs() support for the ACS quirks (Charles Mirabile) [RHEL-102652]
  • Documentation: Fix pci=config_acs= example (Charles Mirabile) [RHEL-102652]
  • Revert 'PCI: Wait for device readiness with Configuration RRS' (John W. Linville) [RHEL-94414]
  • bnxt_en: Skip MAC loopback selftest if it is unsupported by FW (CKI Backport Bot) [RHEL-82564]
  • bnxt_en: Skip PHY loopback ethtool selftest if unsupported by FW (CKI Backport Bot) [RHEL-82564]
  • wifi: ath12k: fix invalid access to memory (CKI Backport Bot) [RHEL-103219] {CVE-2025-38292}
  • crypto: algif_hash - fix double free in hash_accept (CKI Backport Bot) [RHEL-102235] {CVE-2025-38079}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.33.2.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.33.2.0.1.el9_6

kernel-tools-libs

5.14.0-570.33.2.0.1.el9_6

kernel-headers

5.14.0-570.33.2.0.1.el9_6

perf

5.14.0-570.33.2.0.1.el9_6

rtla

5.14.0-570.33.2.0.1.el9_6

rv

5.14.0-570.33.2.0.1.el9_6

kernel-tools

5.14.0-570.33.2.0.1.el9_6

python3-perf

5.14.0-570.33.2.0.1.el9_6

Oracle Linux x86_64

kernel-debug

5.14.0-570.33.2.0.1.el9_6

kernel-debug-modules

5.14.0-570.33.2.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.33.2.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.33.2.0.1.el9_6

kernel-modules-extra

5.14.0-570.33.2.0.1.el9_6

kernel-tools

5.14.0-570.33.2.0.1.el9_6

kernel-debug-devel

5.14.0-570.33.2.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.33.2.0.1.el9_6

kernel-devel

5.14.0-570.33.2.0.1.el9_6

kernel-devel-matched

5.14.0-570.33.2.0.1.el9_6

kernel-doc

5.14.0-570.33.2.0.1.el9_6

kernel-headers

5.14.0-570.33.2.0.1.el9_6

perf

5.14.0-570.33.2.0.1.el9_6

rtla

5.14.0-570.33.2.0.1.el9_6

rv

5.14.0-570.33.2.0.1.el9_6

kernel-cross-headers

5.14.0-570.33.2.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.33.2.0.1.el9_6

libperf

5.14.0-570.33.2.0.1.el9_6

kernel

5.14.0-570.33.2.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.33.2.0.1.el9_6

kernel-core

5.14.0-570.33.2.0.1.el9_6

kernel-debug-core

5.14.0-570.33.2.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.33.2.0.1.el9_6

kernel-modules

5.14.0-570.33.2.0.1.el9_6

kernel-modules-core

5.14.0-570.33.2.0.1.el9_6

kernel-tools-libs

5.14.0-570.33.2.0.1.el9_6

kernel-uki-virt

5.14.0-570.33.2.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.33.2.0.1.el9_6

python3-perf

5.14.0-570.33.2.0.1.el9_6

Связанные CVE

Связанные уязвимости

oracle-oval
6 дней назад

ELSA-2025-13598: kernel security update (MODERATE)

ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

CVSS3: 7.3
redhat
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

nvd
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.

debian
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: w ...