Описание
ELSA-2025-13602: kernel security update (MODERATE)
[5.14.0-570.33.2.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-570.33.2_6]
- Revert 'sch_htb: make htb_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
- Revert 'sch_drr: make drr_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
- Revert 'sch_qfq: make qfq_qlen_notify() idempotent' (Patrick Talbert) [RHEL-108138]
- Revert 'codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()' (Patrick Talbert) [RHEL-108138]
- Revert 'sch_htb: make htb_deactivate() idempotent' (Patrick Talbert) [RHEL-108138]
- Revert 'net/sched: Always pass notifications when child class becomes empty' (Patrick Talbert) [RHEL-108138]
[5.14.0-570.33.1_6]
- net/sched: Always pass notifications when child class becomes empty (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- sch_htb: make htb_deactivate() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- sch_qfq: make qfq_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- sch_drr: make drr_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- sch_htb: make htb_qlen_notify() idempotent (CKI Backport Bot) [RHEL-93387] {CVE-2025-38350}
- redhat: update BUILD_TARGET to rhel-9.6.0-z-test-pesign (Jan Stancek)
- PCI: Use downstream bridges for distributing resources (Jennifer Berringer) [RHEL-102666]
- PCI/ACS: Fix 'pci=config_acs=' parameter (Charles Mirabile) [RHEL-102652]
- PCI: Fix pci_enable_acs() support for the ACS quirks (Charles Mirabile) [RHEL-102652]
- Documentation: Fix pci=config_acs= example (Charles Mirabile) [RHEL-102652]
- Revert 'PCI: Wait for device readiness with Configuration RRS' (John W. Linville) [RHEL-94414]
- bnxt_en: Skip MAC loopback selftest if it is unsupported by FW (CKI Backport Bot) [RHEL-82564]
- bnxt_en: Skip PHY loopback ethtool selftest if unsupported by FW (CKI Backport Bot) [RHEL-82564]
- wifi: ath12k: fix invalid access to memory (CKI Backport Bot) [RHEL-103219] {CVE-2025-38292}
- crypto: algif_hash - fix double free in hash_accept (CKI Backport Bot) [RHEL-102235] {CVE-2025-38079}
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.33.2.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.33.2.0.1.el9_6
kernel-tools-libs
5.14.0-570.33.2.0.1.el9_6
kernel-headers
5.14.0-570.33.2.0.1.el9_6
perf
5.14.0-570.33.2.0.1.el9_6
rtla
5.14.0-570.33.2.0.1.el9_6
rv
5.14.0-570.33.2.0.1.el9_6
kernel-tools
5.14.0-570.33.2.0.1.el9_6
python3-perf
5.14.0-570.33.2.0.1.el9_6
Oracle Linux x86_64
kernel-debug
5.14.0-570.33.2.0.1.el9_6
kernel-debug-modules
5.14.0-570.33.2.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.33.2.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.33.2.0.1.el9_6
kernel-modules-extra
5.14.0-570.33.2.0.1.el9_6
kernel-tools
5.14.0-570.33.2.0.1.el9_6
kernel-debug-devel
5.14.0-570.33.2.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.33.2.0.1.el9_6
kernel-devel
5.14.0-570.33.2.0.1.el9_6
kernel-devel-matched
5.14.0-570.33.2.0.1.el9_6
kernel-doc
5.14.0-570.33.2.0.1.el9_6
kernel-headers
5.14.0-570.33.2.0.1.el9_6
perf
5.14.0-570.33.2.0.1.el9_6
rtla
5.14.0-570.33.2.0.1.el9_6
rv
5.14.0-570.33.2.0.1.el9_6
kernel-cross-headers
5.14.0-570.33.2.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.33.2.0.1.el9_6
libperf
5.14.0-570.33.2.0.1.el9_6
kernel
5.14.0-570.33.2.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.33.2.0.1.el9_6
kernel-core
5.14.0-570.33.2.0.1.el9_6
kernel-debug-core
5.14.0-570.33.2.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.33.2.0.1.el9_6
kernel-modules
5.14.0-570.33.2.0.1.el9_6
kernel-modules-core
5.14.0-570.33.2.0.1.el9_6
kernel-tools-libs
5.14.0-570.33.2.0.1.el9_6
kernel-uki-virt
5.14.0-570.33.2.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.33.2.0.1.el9_6
python3-perf
5.14.0-570.33.2.0.1.el9_6
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix invalid access to memory In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean is_continuation is part of rxcb. Currently, after freeing the skb, the rxcb->is_continuation accessed again which is wrong since the memory is already freed. This might lead use-after-free error. Hence, fix by locally defining bool is_continuation from rxcb, so that after freeing skb, is_continuation can be used. Compile tested only.
In the Linux kernel, the following vulnerability has been resolved: w ...