Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-15785

Опубликовано: 15 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-15785: kernel security update (IMPORTANT)

[4.18.0-553.75.1_10.OL8]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]

[4.18.0-553.75.1_10]

  • Revert 'module, async: async_synchronize_full() on module init iff async is used' (Herton R. Krzesinski) [RHEL-99812]
  • mm/page_alloc: make sure free_pcppages_bulk() bails when given count < 0 (Rafael Aquini) [RHEL-85453]
  • sch_cbq: make cbq_qlen_notify() idempotent (Ivan Vecera) [RHEL-93376]
  • net/sched: ets: use old 'nbands' while purging unused classes (Ivan Vecera) [RHEL-107541] {CVE-2025-38350}
  • net_sched: sch_ets: implement lockless ets_dump() (Ivan Vecera) [RHEL-107541] {CVE-2025-38350}
  • net/sched: Always pass notifications when child class becomes empty (Ivan Vecera) [RHEL-93376] {CVE-2025-38350}
  • net_sched: ets: fix a race in ets_qdisc_change() (Ivan Vecera) [RHEL-107541] {CVE-2025-38107}
  • sch_htb: make htb_deactivate() idempotent (Ivan Vecera) [RHEL-93376] {CVE-2025-37953}
  • codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (Ivan Vecera) [RHEL-93376] {CVE-2025-37798}
  • sch_qfq: make qfq_qlen_notify() idempotent (Ivan Vecera) [RHEL-93376] {CVE-2025-38350}
  • sch_drr: make drr_qlen_notify() idempotent (Ivan Vecera) [RHEL-93376] {CVE-2025-38350}
  • sch_htb: make htb_qlen_notify() idempotent (Ivan Vecera) [RHEL-93376] {CVE-2025-37932}
  • idpf: convert control queue mutex to a spinlock (CKI Backport Bot) [RHEL-106049] {CVE-2025-38392}
  • drm/framebuffer: Acquire internal references on GEM handles (Anusha Srivatsa) [RHEL-106684] {CVE-2025-38449}
  • drm/gem: Acquire references on GEM handles for framebuffers (Anusha Srivatsa) [RHEL-106684] {CVE-2025-38449}
  • tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (partial) (Luis Claudio R. Goncalves) [RHEL-95713]
  • vmxnet3: disable rx data ring on dma allocation failure (Michal Schmidt) [RHEL-106160]
  • xfs: fix error returns from xfs_bmapi_write (Carlos Maiolino) [RHEL-93655]
  • xfs: handle nimaps=0 from xfs_bmapi_write in xfs_alloc_file_space (Carlos Maiolino) [RHEL-93655]
  • net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (CKI Backport Bot) [RHEL-112239] {CVE-2023-53125}
  • net: usb: smsc75xx: Limit packet length to skb->len (CKI Backport Bot) [RHEL-112239] {CVE-2023-53125}
  • PCI: Support BAR sizes up to 8TB (Myron Stowe) [RHEL-106671]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-tools-libs-devel

4.18.0-553.75.1.el8_10

bpftool

4.18.0-553.75.1.el8_10

kernel-cross-headers

4.18.0-553.75.1.el8_10

kernel-headers

4.18.0-553.75.1.el8_10

kernel-tools

4.18.0-553.75.1.el8_10

kernel-tools-libs

4.18.0-553.75.1.el8_10

perf

4.18.0-553.75.1.el8_10

python3-perf

4.18.0-553.75.1.el8_10

Oracle Linux x86_64

kernel-tools-libs-devel

4.18.0-553.75.1.el8_10

kernel-debug-modules-extra

4.18.0-553.75.1.el8_10

kernel-headers

4.18.0-553.75.1.el8_10

kernel-modules-extra

4.18.0-553.75.1.el8_10

kernel-tools

4.18.0-553.75.1.el8_10

bpftool

4.18.0-553.75.1.el8_10

kernel

4.18.0-553.75.1.el8_10

kernel-abi-stablelists

4.18.0-553.75.1.el8_10

kernel-core

4.18.0-553.75.1.el8_10

kernel-cross-headers

4.18.0-553.75.1.el8_10

kernel-debug

4.18.0-553.75.1.el8_10

kernel-debug-core

4.18.0-553.75.1.el8_10

kernel-debug-devel

4.18.0-553.75.1.el8_10

kernel-debug-modules

4.18.0-553.75.1.el8_10

kernel-devel

4.18.0-553.75.1.el8_10

kernel-doc

4.18.0-553.75.1.el8_10

kernel-modules

4.18.0-553.75.1.el8_10

kernel-tools-libs

4.18.0-553.75.1.el8_10

perf

4.18.0-553.75.1.el8_10

python3-perf

4.18.0-553.75.1.el8_10

Связанные уязвимости

oracle-oval
2 месяца назад

ELSA-2025-15447: kernel security update (IMPORTANT)

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] <TASK> [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_...

CVSS3: 7.3
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] <TASK> [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_...

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be released while the GEM buffer object is attached to a DRM framebuffer. This leads to the release of the dma-buf backing the buffer object, if any. [1] Trying to use the framebuffer in further mode-setting operations leads to a segmentation fault. Most easily happens with driver that use shadow planes for vmap-ing the dma-buf during a page flip. An example is shown below. [ 156.791968] ------------[ cut here ]------------ [ 156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430 [...] [ 156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430 [ 157.043420] Call Trace: [ 157.045898] <TASK> [ 157.048030] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.052436] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.056836] ? show_trace_log_lvl+0x1af/0x2c0 [ 157.061253] ? drm_gem_shmem_vmap+0x74/0x710 [ 157.065567] ? dma_

CVSS3: 7
msrc
2 месяца назад

drm/gem: Acquire references on GEM handles for framebuffers