Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-16372

Опубликовано: 22 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-16372: kernel security update (MODERATE)

[4.18.0-553.76.1_10.OL8]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]

[4.18.0-553.76.1_10]

  • HID: core: Harden s32ton() against conversion to 0 bits (CKI Backport Bot) [RHEL-111027] {CVE-2025-38556}
  • HID: stop exporting hid_snto32() (CKI Backport Bot) [RHEL-111027] {CVE-2025-38556}
  • HID: simplify snto32() (CKI Backport Bot) [RHEL-111027] {CVE-2025-38556}
  • HID: core: fix shift-out-of-bounds in hid_report_raw_event (CKI Backport Bot) [RHEL-111027] {CVE-2025-38556}
  • use uniform permission checks for all mount propagation changes (Ian Kent) [RHEL-107299] {CVE-2025-38498}
  • do_change_type(): refuse to operate on unmounted/not ours mounts (Ian Kent) [RHEL-107299] {CVE-2025-38498}
  • xfs: make sure sb_fdblocks is non-negative (Pavel Reichl) [RHEL-104193]
  • vsock: Fix transport_* TOCTOU (CKI Backport Bot) [RHEL-105991] {CVE-2025-38461}

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-tools-libs-devel

4.18.0-553.76.1.el8_10

bpftool

4.18.0-553.76.1.el8_10

kernel-cross-headers

4.18.0-553.76.1.el8_10

kernel-headers

4.18.0-553.76.1.el8_10

kernel-tools

4.18.0-553.76.1.el8_10

kernel-tools-libs

4.18.0-553.76.1.el8_10

perf

4.18.0-553.76.1.el8_10

python3-perf

4.18.0-553.76.1.el8_10

Oracle Linux x86_64

kernel-tools-libs-devel

4.18.0-553.76.1.el8_10

bpftool

4.18.0-553.76.1.el8_10

kernel

4.18.0-553.76.1.el8_10

kernel-abi-stablelists

4.18.0-553.76.1.el8_10

kernel-core

4.18.0-553.76.1.el8_10

kernel-cross-headers

4.18.0-553.76.1.el8_10

kernel-debug

4.18.0-553.76.1.el8_10

kernel-debug-core

4.18.0-553.76.1.el8_10

kernel-debug-devel

4.18.0-553.76.1.el8_10

kernel-debug-modules

4.18.0-553.76.1.el8_10

kernel-debug-modules-extra

4.18.0-553.76.1.el8_10

kernel-devel

4.18.0-553.76.1.el8_10

kernel-doc

4.18.0-553.76.1.el8_10

kernel-headers

4.18.0-553.76.1.el8_10

kernel-modules

4.18.0-553.76.1.el8_10

kernel-modules-extra

4.18.0-553.76.1.el8_10

kernel-tools

4.18.0-553.76.1.el8_10

kernel-tools-libs

4.18.0-553.76.1.el8_10

perf

4.18.0-553.76.1.el8_10

python3-perf

4.18.0-553.76.1.el8_10

Связанные уязвимости

rocky
около 1 месяца назад

Moderate: kernel security update

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

CVSS3: 7.3
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload. Protect new_transport from becoming a stale pointer. This also takes care of an insecure call in vsock_use_local_transport(); add a lockdep assert. BUG: unable to handle page fault for address: fffffbfff8056000 Oops: Oops: 0000 [#1] SMP KASAN RIP: 0010:vsock_assign_transport+0x366/0x600 Call Trace: vsock_connect+0x59c/0xc40 __sys_connect+0xe8/0x100 __x64_sys_connect+0x6e/0xc0 do_syscall_64+0x92/0x1c0 entry_SYSCALL_64_after_hwframe+0x4b/0x53

CVSS3: 7.3
msrc
2 месяца назад

vsock: Fix transport_* TOCTOU