Описание
ELSA-2025-17760: kernel security update (MODERATE)
[5.14.0-570.52.1.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-570.52.1_6]
- crypto: seqiv - Handle EBUSY correctly (CKI Backport Bot) [RHEL-117232] {CVE-2023-53373}
- ibmvnic: Increase max subcrq indirect entries with fallback (Mamatha Inamdar) [RHEL-116186]
- hv_netvsc: Fix panic during namespace deletion with VF (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: Fix DSCP value in modify QP (Maxim Levitsky) [RHEL-115069]
- net: mana: Handle Reset Request from MANA NIC (Maxim Levitsky) [RHEL-115069]
- net: mana: Set tx_packets to post gso processing packet count (Maxim Levitsky) [RHEL-115069]
- net: mana: Handle unsupported HWC commands (Maxim Levitsky) [RHEL-115069]
- net: mana: Add handler for hardware servicing events (Maxim Levitsky) [RHEL-115069]
- net: mana: Expose additional hardware counters for drop and TC via ethtool. (Maxim Levitsky) [RHEL-115069]
- hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf (Maxim Levitsky) [RHEL-115069]
- net: mana: Record doorbell physical address in PF mode (Maxim Levitsky) [RHEL-115069]
- net: mana: Add support for Multi Vports on Bare metal (Maxim Levitsky) [RHEL-115069]
- net: mana: Switch to page pool for jumbo frames (Maxim Levitsky) [RHEL-115069]
- net: mana: Add metadata support for xdp mode (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: Handle net event for pointing to the current netdev (Maxim Levitsky) [RHEL-115069]
- net: mana: Change the function signature of mana_get_primary_netdev_rcu (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: Ensure variable err is initialized (Maxim Levitsky) [RHEL-115069]
- net: mana: Add debug logs in MANA network driver (Maxim Levitsky) [RHEL-115069]
- hv_netvsc: Use VF's tso_max_size value when data path is VF (Maxim Levitsky) [RHEL-115069]
- net: mana: Allow tso_max_size to go up-to GSO_MAX_SIZE (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: request error CQEs when supported (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: Query feature_flags bitmask from FW (Maxim Levitsky) [RHEL-115069]
- net: mana: Support holes in device list reply msg (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: Allocate PAGE aligned doorbell index (Maxim Levitsky) [RHEL-115069]
- hv_netvsc: Link queues to NAPIs (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (Maxim Levitsky) [RHEL-115069]
- RDMA/mana_ib: use the correct page table index based on hardware page size (Maxim Levitsky) [RHEL-115069]
- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (Maxim Levitsky) [RHEL-115069]
- net: mana: Fix RX buf alloc_size alignment and atomic op panic (Maxim Levitsky) [RHEL-115069]
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too (CKI Backport Bot) [RHEL-114688] {CVE-2025-38729}
- ALSA: usb-audio: Fix size validation in convert_chmap_v3() (CKI Backport Bot) [RHEL-114688]
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CKI Backport Bot) [RHEL-114688] {CVE-2025-39757}
- HID: core: Harden s32ton() against conversion to 0 bits (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
- HID: stop exporting hid_snto32() (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
- HID: simplify snto32() (CKI Backport Bot) [RHEL-111036] {CVE-2025-38556}
- eventpoll: Fix semi-unbounded recursion (CKI Backport Bot) [RHEL-111052] {CVE-2025-38614}
- smb: client: fix session setup against servers that require SPN (Paulo Alcantara) [RHEL-107109]
- smb: client: allow parsing zero-length AV pairs (Paulo Alcantara) [RHEL-107109]
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.52.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.52.1.0.1.el9_6
libperf
5.14.0-570.52.1.0.1.el9_6
kernel-headers
5.14.0-570.52.1.0.1.el9_6
perf
5.14.0-570.52.1.0.1.el9_6
rtla
5.14.0-570.52.1.0.1.el9_6
rv
5.14.0-570.52.1.0.1.el9_6
kernel-tools
5.14.0-570.52.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.52.1.0.1.el9_6
python3-perf
5.14.0-570.52.1.0.1.el9_6
Oracle Linux x86_64
kernel
5.14.0-570.52.1.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.52.1.0.1.el9_6
kernel-core
5.14.0-570.52.1.0.1.el9_6
kernel-debug
5.14.0-570.52.1.0.1.el9_6
kernel-debug-core
5.14.0-570.52.1.0.1.el9_6
kernel-debug-modules
5.14.0-570.52.1.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.52.1.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.52.1.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.52.1.0.1.el9_6
kernel-modules
5.14.0-570.52.1.0.1.el9_6
kernel-modules-core
5.14.0-570.52.1.0.1.el9_6
kernel-modules-extra
5.14.0-570.52.1.0.1.el9_6
kernel-tools
5.14.0-570.52.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.52.1.0.1.el9_6
kernel-uki-virt
5.14.0-570.52.1.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.52.1.0.1.el9_6
python3-perf
5.14.0-570.52.1.0.1.el9_6
kernel-debug-devel
5.14.0-570.52.1.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.52.1.0.1.el9_6
kernel-devel
5.14.0-570.52.1.0.1.el9_6
kernel-devel-matched
5.14.0-570.52.1.0.1.el9_6
kernel-doc
5.14.0-570.52.1.0.1.el9_6
kernel-headers
5.14.0-570.52.1.0.1.el9_6
perf
5.14.0-570.52.1.0.1.el9_6
rtla
5.14.0-570.52.1.0.1.el9_6
rv
5.14.0-570.52.1.0.1.el9_6
kernel-cross-headers
5.14.0-570.52.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.52.1.0.1.el9_6
libperf
5.14.0-570.52.1.0.1.el9_6
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.