Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15648

Опубликовано: 25 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2025-15648: kernel security update (IMPORTANT)

[3.10.0-1160.119.1.0.12]

  • scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) [Orabug: 38414589]
  • posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) [Orabug: 38414589]

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

bpftool

3.10.0-1160.119.1.0.12.el7

kernel

3.10.0-1160.119.1.0.12.el7

kernel-abi-whitelists

3.10.0-1160.119.1.0.12.el7

kernel-debug

3.10.0-1160.119.1.0.12.el7

kernel-debug-devel

3.10.0-1160.119.1.0.12.el7

kernel-devel

3.10.0-1160.119.1.0.12.el7

kernel-doc

3.10.0-1160.119.1.0.12.el7

kernel-headers

3.10.0-1160.119.1.0.12.el7

kernel-tools

3.10.0-1160.119.1.0.12.el7

kernel-tools-libs

3.10.0-1160.119.1.0.12.el7

kernel-tools-libs-devel

3.10.0-1160.119.1.0.12.el7

perf

3.10.0-1160.119.1.0.12.el7

python-perf

3.10.0-1160.119.1.0.12.el7

Связанные CVE

Связанные уязвимости

oracle-oval
20 дней назад

ELSA-2025-15661: kernel security update (IMPORTANT)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

msrc
около 2 месяцев назад

Описание отсутствует