Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15008

Опубликовано: 03 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-15008: kernel security update (MODERATE)

[4.18.0-553.72.1_10.OL8]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]

[4.18.0-553.72.1_10]

  • scsi: lpfc: Use memcpy() for BIOS version (Ewan D. Milne) [RHEL-105927] {CVE-2025-38332}
  • watchdog/perf: properly initialize the turbo mode timestamp and rearm counter (David Arcari) [RHEL-103371]
  • RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (Michal Schmidt) [RHEL-104260] {CVE-2025-38211}
  • RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (Michal Schmidt) [RHEL-104260] {CVE-2024-47696}
  • RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (Michal Schmidt) [RHEL-104260] {CVE-2024-42285}
  • net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (CKI Backport Bot) [RHEL-106312] {CVE-2025-38477}
  • net/sched: sch_qfq: Fix race condition on qfq_aggregate (CKI Backport Bot) [RHEL-106312] {CVE-2025-38477}
  • cxgb4: use port number to set mac addr (CKI Backport Bot) [RHEL-75976]
  • net/sched: Abort __tc_modify_qdisc if parent class does not exist (CKI Backport Bot) [RHEL-107894]
  • aacraid: fix a buffer overflow (Tomas Henzl) [RHEL-62313]
  • filemap: remove use of wait bookmarks (Brian Foster) [RHEL-107181]
  • x86/efistub: Omit physical KASLR when memory reservations exist (Ricardo Robaina) [RHEL-82369]
  • efi/libstub: Check return value of efi_parse_options (Ricardo Robaina) [RHEL-82369]
  • efi/x86: Support builtin command line (Ricardo Robaina) [RHEL-82369]
  • tipc: Fix use-after-free in tipc_conn_close(). (CKI Backport Bot) [RHEL-106635] {CVE-2025-38464}
  • sbitmap: remove stale comment in sbq_calc_wake_batch (Ming Lei) [RHEL-81758]
  • block: Fix lockdep warning in blk_mq_mark_tag_wait (Ming Lei) [RHEL-81758]
  • blk-mq: fix potential io hang by wrong 'wake_batch' (Ming Lei) [RHEL-81758]
  • lib/sbitmap: define swap_lock as raw_spinlock_t (Ming Lei) [RHEL-81758]
  • sbitmap: fix io hung due to race on sbitmap_word::cleared (Ming Lei) [RHEL-81758]
  • sbitmap: use READ_ONCE to access map->word (Ming Lei) [RHEL-81758]
  • sbitmap: fix batching wakeup (Ming Lei) [RHEL-81758]
  • sbitmap: correct wake_batch recalculation to avoid potential IO hung (Ming Lei) [RHEL-81758]
  • sbitmap: add sbitmap_find_bit to remove repeat code in __sbitmap_get/__sbitmap_get_shallow (Ming Lei) [RHEL-81758]
  • sbitmap: rewrite sbitmap_find_bit_in_index to reduce repeat code (Ming Lei) [RHEL-81758]
  • sbitmap: remove redundant check in __sbitmap_queue_get_batch (Ming Lei) [RHEL-81758]
  • sbitmap: remove unnecessary calculation of alloc_hint in __sbitmap_get_shallow (Ming Lei) [RHEL-81758]
  • sbitmap: Use atomic_long_try_cmpxchg in __sbitmap_queue_get_batch (Ming Lei) [RHEL-81758]
  • sbitmap: remove unnecessary code in __sbitmap_queue_get_batch (Ming Lei) [RHEL-81758]
  • lib/sbitmap: Fix invalid loop in __sbitmap_queue_get_batch() (Ming Lei) [RHEL-81758]
  • lib/sbitmap: kill 'depth' from sbitmap_word (Ming Lei) [RHEL-81758]
  • sbitmap: add __sbitmap_queue_get_batch() (Ming Lei) [RHEL-81758]
  • sbitmap: Try each queue to wake up at least one waiter (Ming Lei) [RHEL-81758]
  • wait: Return number of exclusive waiters awaken (Ming Lei) [RHEL-81758]
  • sched/wait: Deduplicate code with do-while (Ming Lei) [RHEL-81758]
  • sbitmap: Advance the queue index before waking up a queue (Ming Lei) [RHEL-81758]
  • sbitmap: Use single per-bitmap counting to wake up queued tags (Ming Lei) [RHEL-81758]
  • blk-mq: Fix wrong wakeup batch configuration which will cause hang (Ming Lei) [RHEL-81758]
  • blk-mq: fix tag_get wait task can't be awakened (Ming Lei) [RHEL-81758]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-tools-libs-devel

4.18.0-553.72.1.el8_10

bpftool

4.18.0-553.72.1.el8_10

kernel-cross-headers

4.18.0-553.72.1.el8_10

kernel-headers

4.18.0-553.72.1.el8_10

kernel-tools

4.18.0-553.72.1.el8_10

kernel-tools-libs

4.18.0-553.72.1.el8_10

perf

4.18.0-553.72.1.el8_10

python3-perf

4.18.0-553.72.1.el8_10

Oracle Linux x86_64

kernel-tools-libs-devel

4.18.0-553.72.1.el8_10

bpftool

4.18.0-553.72.1.el8_10

kernel-doc

4.18.0-553.72.1.el8_10

python3-perf

4.18.0-553.72.1.el8_10

kernel

4.18.0-553.72.1.el8_10

kernel-abi-stablelists

4.18.0-553.72.1.el8_10

kernel-core

4.18.0-553.72.1.el8_10

kernel-cross-headers

4.18.0-553.72.1.el8_10

kernel-debug

4.18.0-553.72.1.el8_10

kernel-debug-core

4.18.0-553.72.1.el8_10

kernel-debug-devel

4.18.0-553.72.1.el8_10

kernel-debug-modules

4.18.0-553.72.1.el8_10

kernel-debug-modules-extra

4.18.0-553.72.1.el8_10

kernel-devel

4.18.0-553.72.1.el8_10

kernel-headers

4.18.0-553.72.1.el8_10

kernel-modules

4.18.0-553.72.1.el8_10

kernel-modules-extra

4.18.0-553.72.1.el8_10

kernel-tools

4.18.0-553.72.1.el8_10

kernel-tools-libs

4.18.0-553.72.1.el8_10

perf

4.18.0-553.72.1.el8_10

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

CVSS3: 7.3
redhat
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r...

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_cm event handlers or when the application destroys the cm_id. This commit introduced the use-after-free condition where cm_id_private object could still be in use by event handler works during the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to destroying CM IDs") addressed this use-after- free by flushing all pending works at the cm_id destruction. However, still another use-after-free possibility remained. It happens with the work objects allocated for each cm_id_priv within alloc_work_entries() during cm_id creation, and subsequently freed in dealloc_work_entries() once all r

msrc
около 1 месяца назад

Описание отсутствует

debian
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: R ...