Описание
ELSA-2025-15429: kernel security update (IMPORTANT)
[5.14.0-570.41.1.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-570.41.1_6]
- powerpc/pseries/iommu: Fix kmemleak in TCE table userspace view (Mamatha Inamdar) [RHEL-107002]
- net: ibmveth: make veth_pool_store stop hanging (Mamatha Inamdar) [RHEL-109494]
- ibmveth: Always stop tx queues during close (Mamatha Inamdar) [RHEL-109494]
- smb: client: fix race with concurrent opens in rename(2) (Paulo Alcantara) [RHEL-109723]
- smb: client: fix race with concurrent opens in unlink(2) (Paulo Alcantara) [RHEL-109723]
- smb: convert to ctime accessor functions (Paulo Alcantara) [RHEL-109723]
- crypto: tegra - Fix IV usage for AES ECB (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Fix format specifier in tegra_sha_prep_cmd() (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Use HMAC fallback when keyslots are full (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Reserve keyslots to allocate dynamically (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Set IV to NULL explicitly for AES ECB (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Fix CMAC intermediate result handling (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Fix HASH intermediate result handling (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Transfer HASH init function to crypto engine (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - check return value for hash do_one_req (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - finalize crypto req on error (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Do not use fixed size buffers (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - Use separate buffer for setkey (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - remove unneeded crypto_engine_stop() call (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - remove redundant error check on ret (Nirmala Dalvi) [RHEL-107286]
- crypto: tegra - do not transfer req when tegra init fails (Nirmala Dalvi) [RHEL-107286]
- crypto: engine - Remove prepare/unprepare request (Nirmala Dalvi) [RHEL-107286]
- udmabuf: fix a buf size overflow issue during udmabuf creation (CKI Backport Bot) [RHEL-99746] {CVE-2025-37803}
[5.14.0-570.40.1_6]
- idpf: convert control queue mutex to a spinlock (CKI Backport Bot) [RHEL-106054] {CVE-2025-38392}
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.41.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.41.1.0.1.el9_6
libperf
5.14.0-570.41.1.0.1.el9_6
kernel-tools
5.14.0-570.41.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.41.1.0.1.el9_6
python3-perf
5.14.0-570.41.1.0.1.el9_6
kernel-headers
5.14.0-570.41.1.0.1.el9_6
perf
5.14.0-570.41.1.0.1.el9_6
rtla
5.14.0-570.41.1.0.1.el9_6
rv
5.14.0-570.41.1.0.1.el9_6
Oracle Linux x86_64
kernel
5.14.0-570.41.1.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.41.1.0.1.el9_6
kernel-core
5.14.0-570.41.1.0.1.el9_6
kernel-debug
5.14.0-570.41.1.0.1.el9_6
kernel-debug-core
5.14.0-570.41.1.0.1.el9_6
kernel-debug-modules
5.14.0-570.41.1.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.41.1.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.41.1.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.41.1.0.1.el9_6
kernel-modules
5.14.0-570.41.1.0.1.el9_6
kernel-modules-core
5.14.0-570.41.1.0.1.el9_6
kernel-modules-extra
5.14.0-570.41.1.0.1.el9_6
kernel-tools
5.14.0-570.41.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.41.1.0.1.el9_6
kernel-uki-virt
5.14.0-570.41.1.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.41.1.0.1.el9_6
python3-perf
5.14.0-570.41.1.0.1.el9_6
kernel-debug-devel
5.14.0-570.41.1.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.41.1.0.1.el9_6
kernel-devel
5.14.0-570.41.1.0.1.el9_6
kernel-devel-matched
5.14.0-570.41.1.0.1.el9_6
kernel-doc
5.14.0-570.41.1.0.1.el9_6
kernel-headers
5.14.0-570.41.1.0.1.el9_6
perf
5.14.0-570.41.1.0.1.el9_6
rtla
5.14.0-570.41.1.0.1.el9_6
rv
5.14.0-570.41.1.0.1.el9_6
kernel-cross-headers
5.14.0-570.41.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.41.1.0.1.el9_6
libperf
5.14.0-570.41.1.0.1.el9_6
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F...
In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F...
In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F
In the Linux kernel, the following vulnerability has been resolved: i ...
In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.