Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15661

Опубликовано: 12 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-15661: kernel security update (IMPORTANT)

[5.14.0-570.42.2.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.42.2_6]

  • posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CKI Backport Bot) [RHEL-112780] {CVE-2025-38352}
  • powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (CKI Backport Bot) [RHEL-113173]

[5.14.0-570.42.1_6]

  • powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (Mamatha Inamdar) [RHEL-103015]
  • drm/framebuffer: Acquire internal references on GEM handles (Jose Exposito) [RHEL-106699] {CVE-2025-38449}
  • drm/gem: Acquire references on GEM handles for framebuffers (Jose Exposito) [RHEL-106699] {CVE-2025-38449}
  • drm/vkms: Fix use after free and double free on init error (CKI KWF BOT) [RHEL-99420] {CVE-2025-22097}
  • scsi: lpfc: Use memcpy() for BIOS version (Ewan D. Milne) [RHEL-105933] {CVE-2025-38332}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.42.2.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.42.2.0.1.el9_6

libperf

5.14.0-570.42.2.0.1.el9_6

kernel-headers

5.14.0-570.42.2.0.1.el9_6

perf

5.14.0-570.42.2.0.1.el9_6

rtla

5.14.0-570.42.2.0.1.el9_6

rv

5.14.0-570.42.2.0.1.el9_6

kernel-tools

5.14.0-570.42.2.0.1.el9_6

kernel-tools-libs

5.14.0-570.42.2.0.1.el9_6

python3-perf

5.14.0-570.42.2.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.42.2.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.42.2.0.1.el9_6

kernel-core

5.14.0-570.42.2.0.1.el9_6

kernel-debug

5.14.0-570.42.2.0.1.el9_6

kernel-debug-core

5.14.0-570.42.2.0.1.el9_6

kernel-debug-modules

5.14.0-570.42.2.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.42.2.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.42.2.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.42.2.0.1.el9_6

kernel-modules

5.14.0-570.42.2.0.1.el9_6

kernel-modules-core

5.14.0-570.42.2.0.1.el9_6

kernel-modules-extra

5.14.0-570.42.2.0.1.el9_6

kernel-tools

5.14.0-570.42.2.0.1.el9_6

kernel-tools-libs

5.14.0-570.42.2.0.1.el9_6

kernel-uki-virt

5.14.0-570.42.2.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.42.2.0.1.el9_6

python3-perf

5.14.0-570.42.2.0.1.el9_6

kernel-debug-devel

5.14.0-570.42.2.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.42.2.0.1.el9_6

kernel-devel

5.14.0-570.42.2.0.1.el9_6

kernel-devel-matched

5.14.0-570.42.2.0.1.el9_6

kernel-doc

5.14.0-570.42.2.0.1.el9_6

kernel-headers

5.14.0-570.42.2.0.1.el9_6

perf

5.14.0-570.42.2.0.1.el9_6

rtla

5.14.0-570.42.2.0.1.el9_6

rv

5.14.0-570.42.2.0.1.el9_6

kernel-cross-headers

5.14.0-570.42.2.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.42.2.0.1.el9_6

libperf

5.14.0-570.42.2.0.1.el9_6

Связанные уязвимости

oracle-oval
7 дней назад

ELSA-2025-15648: kernel security update (IMPORTANT)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.

msrc
около 2 месяцев назад

Описание отсутствует