Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-17760

Опубликовано: 13 окт. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-17760: kernel security update (MODERATE)

[5.14.0-570.52.1.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.52.1_6]

  • crypto: seqiv - Handle EBUSY correctly (CKI Backport Bot) [RHEL-117232] {CVE-2023-53373}
  • ibmvnic: Increase max subcrq indirect entries with fallback (Mamatha Inamdar) [RHEL-116186]
  • hv_netvsc: Fix panic during namespace deletion with VF (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: Fix DSCP value in modify QP (Maxim Levitsky) [RHEL-115069]
  • net: mana: Handle Reset Request from MANA NIC (Maxim Levitsky) [RHEL-115069]
  • net: mana: Set tx_packets to post gso processing packet count (Maxim Levitsky) [RHEL-115069]
  • net: mana: Handle unsupported HWC commands (Maxim Levitsky) [RHEL-115069]
  • net: mana: Add handler for hardware servicing events (Maxim Levitsky) [RHEL-115069]
  • net: mana: Expose additional hardware counters for drop and TC via ethtool. (Maxim Levitsky) [RHEL-115069]
  • hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf (Maxim Levitsky) [RHEL-115069]
  • net: mana: Record doorbell physical address in PF mode (Maxim Levitsky) [RHEL-115069]
  • net: mana: Add support for Multi Vports on Bare metal (Maxim Levitsky) [RHEL-115069]
  • net: mana: Switch to page pool for jumbo frames (Maxim Levitsky) [RHEL-115069]
  • net: mana: Add metadata support for xdp mode (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: Handle net event for pointing to the current netdev (Maxim Levitsky) [RHEL-115069]
  • net: mana: Change the function signature of mana_get_primary_netdev_rcu (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: Ensure variable err is initialized (Maxim Levitsky) [RHEL-115069]
  • net: mana: Add debug logs in MANA network driver (Maxim Levitsky) [RHEL-115069]
  • hv_netvsc: Use VF's tso_max_size value when data path is VF (Maxim Levitsky) [RHEL-115069]
  • net: mana: Allow tso_max_size to go up-to GSO_MAX_SIZE (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: request error CQEs when supported (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: Query feature_flags bitmask from FW (Maxim Levitsky) [RHEL-115069]
  • net: mana: Support holes in device list reply msg (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: Allocate PAGE aligned doorbell index (Maxim Levitsky) [RHEL-115069]
  • hv_netvsc: Link queues to NAPIs (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (Maxim Levitsky) [RHEL-115069]
  • RDMA/mana_ib: use the correct page table index based on hardware page size (Maxim Levitsky) [RHEL-115069]
  • net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (Maxim Levitsky) [RHEL-115069]
  • net: mana: Fix RX buf alloc_size alignment and atomic op panic (Maxim Levitsky) [RHEL-115069]
  • ALSA: usb-audio: Validate UAC3 power domain descriptors, too (CKI Backport Bot) [RHEL-114688] {CVE-2025-38729}
  • ALSA: usb-audio: Fix size validation in convert_chmap_v3() (CKI Backport Bot) [RHEL-114688]
  • ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CKI Backport Bot) [RHEL-114688] {CVE-2025-39757}
  • HID: core: Harden s32ton() against conversion to 0 bits (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
  • HID: stop exporting hid_snto32() (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
  • HID: simplify snto32() (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
  • eventpoll: Fix semi-unbounded recursion (CKI Backport Bot) [RHEL-111052] {CVE-2025-38614}
  • smb: client: fix session setup against servers that require SPN (Paulo Alcantara) [RHEL-107109]
  • smb: client: allow parsing zero-length AV pairs (Paulo Alcantara) [RHEL-107109]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.52.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.52.1.0.1.el9_6

libperf

5.14.0-570.52.1.0.1.el9_6

kernel-headers

5.14.0-570.52.1.0.1.el9_6

perf

5.14.0-570.52.1.0.1.el9_6

rtla

5.14.0-570.52.1.0.1.el9_6

rv

5.14.0-570.52.1.0.1.el9_6

kernel-tools

5.14.0-570.52.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.52.1.0.1.el9_6

python3-perf

5.14.0-570.52.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.52.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.52.1.0.1.el9_6

kernel-core

5.14.0-570.52.1.0.1.el9_6

kernel-debug

5.14.0-570.52.1.0.1.el9_6

kernel-debug-core

5.14.0-570.52.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.52.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.52.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.52.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.52.1.0.1.el9_6

kernel-modules

5.14.0-570.52.1.0.1.el9_6

kernel-modules-core

5.14.0-570.52.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.52.1.0.1.el9_6

kernel-tools

5.14.0-570.52.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.52.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.52.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.52.1.0.1.el9_6

python3-perf

5.14.0-570.52.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.52.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.52.1.0.1.el9_6

kernel-devel

5.14.0-570.52.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.52.1.0.1.el9_6

kernel-doc

5.14.0-570.52.1.0.1.el9_6

kernel-headers

5.14.0-570.52.1.0.1.el9_6

perf

5.14.0-570.52.1.0.1.el9_6

rtla

5.14.0-570.52.1.0.1.el9_6

rv

5.14.0-570.52.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.52.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.52.1.0.1.el9_6

libperf

5.14.0-570.52.1.0.1.el9_6

Связанные уязвимости

rocky
18 дней назад

Moderate: kernel security update

oracle-oval
23 дня назад

ELSA-2025-17776: kernel security update (MODERATE)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.