Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15429

Опубликовано: 10 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-15429: kernel security update (IMPORTANT)

[5.14.0-570.41.1.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.41.1_6]

  • powerpc/pseries/iommu: Fix kmemleak in TCE table userspace view (Mamatha Inamdar) [RHEL-107002]
  • net: ibmveth: make veth_pool_store stop hanging (Mamatha Inamdar) [RHEL-109494]
  • ibmveth: Always stop tx queues during close (Mamatha Inamdar) [RHEL-109494]
  • smb: client: fix race with concurrent opens in rename(2) (Paulo Alcantara) [RHEL-109723]
  • smb: client: fix race with concurrent opens in unlink(2) (Paulo Alcantara) [RHEL-109723]
  • smb: convert to ctime accessor functions (Paulo Alcantara) [RHEL-109723]
  • crypto: tegra - Fix IV usage for AES ECB (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Fix format specifier in tegra_sha_prep_cmd() (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Use HMAC fallback when keyslots are full (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Reserve keyslots to allocate dynamically (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Set IV to NULL explicitly for AES ECB (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Fix CMAC intermediate result handling (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Fix HASH intermediate result handling (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Transfer HASH init function to crypto engine (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - check return value for hash do_one_req (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - finalize crypto req on error (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Do not use fixed size buffers (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - Use separate buffer for setkey (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - remove unneeded crypto_engine_stop() call (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - remove redundant error check on ret (Nirmala Dalvi) [RHEL-107286]
  • crypto: tegra - do not transfer req when tegra init fails (Nirmala Dalvi) [RHEL-107286]
  • crypto: engine - Remove prepare/unprepare request (Nirmala Dalvi) [RHEL-107286]
  • udmabuf: fix a buf size overflow issue during udmabuf creation (CKI Backport Bot) [RHEL-99746] {CVE-2025-37803}

[5.14.0-570.40.1_6]

  • idpf: convert control queue mutex to a spinlock (CKI Backport Bot) [RHEL-106054] {CVE-2025-38392}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.41.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.41.1.0.1.el9_6

libperf

5.14.0-570.41.1.0.1.el9_6

kernel-tools

5.14.0-570.41.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.41.1.0.1.el9_6

python3-perf

5.14.0-570.41.1.0.1.el9_6

kernel-headers

5.14.0-570.41.1.0.1.el9_6

perf

5.14.0-570.41.1.0.1.el9_6

rtla

5.14.0-570.41.1.0.1.el9_6

rv

5.14.0-570.41.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.41.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.41.1.0.1.el9_6

kernel-core

5.14.0-570.41.1.0.1.el9_6

kernel-debug

5.14.0-570.41.1.0.1.el9_6

kernel-debug-core

5.14.0-570.41.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.41.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.41.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.41.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.41.1.0.1.el9_6

kernel-modules

5.14.0-570.41.1.0.1.el9_6

kernel-modules-core

5.14.0-570.41.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.41.1.0.1.el9_6

kernel-tools

5.14.0-570.41.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.41.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.41.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.41.1.0.1.el9_6

python3-perf

5.14.0-570.41.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.41.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.41.1.0.1.el9_6

kernel-devel

5.14.0-570.41.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.41.1.0.1.el9_6

kernel-doc

5.14.0-570.41.1.0.1.el9_6

kernel-headers

5.14.0-570.41.1.0.1.el9_6

perf

5.14.0-570.41.1.0.1.el9_6

rtla

5.14.0-570.41.1.0.1.el9_6

rv

5.14.0-570.41.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.41.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.41.1.0.1.el9_6

libperf

5.14.0-570.41.1.0.1.el9_6

Связанные CVE

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F...

CVSS3: 7.3
redhat
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F...

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated on module load: [ 324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager [ 324.701689] preempt_count: 201, expected: 0 [ 324.701693] RCU nest depth: 0, expected: 0 [ 324.701697] 2 locks held by NetworkManager/1582: [ 324.701702] #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0 [ 324.701730] #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870 [ 324.701749] Preemption disabled at: [ 324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870 [ 324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary) [ 324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50F

debian
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 7.8
ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

Уязвимость ELSA-2025-15429