Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-18281

Опубликовано: 20 окт. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-18281: kernel security update (MODERATE)

[5.14.0-570.55.1.0.1]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.55.1]

  • scsi: lpfc: Fix buffer free/clear order in deferred receive path (CKI Backport Bot) [RHEL-119115] {CVE-2025-39841}

[5.14.0-570.54.1]

  • firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (Charles Mirabile) [RHEL-113836] {CVE-2022-50087}
  • SUNRPC: call xs_sock_process_cmsg for all cmsg (Olga Kornievskaia) [RHEL-110811]
  • sunrpc: fix client side handling of tls alerts (Olga Kornievskaia) [RHEL-110811] {CVE-2025-38571}
  • efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CKI Backport Bot) [RHEL-118256] {CVE-2025-39817}
  • sunrpc: fix handling of server side tls alerts (Steve Dickson) [RHEL-111070] {CVE-2025-38566}
  • platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (Jay Shin) [RHEL-116679]

[5.14.0-570.53.1]

  • wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CKI Backport Bot) [RHEL-117578] {CVE-2025-39849}
  • ibmvnic: Use ndo_get_stats64 to fix inaccurate SAR reporting (Mamatha Inamdar) [RHEL-114436]
  • ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (Mamatha Inamdar) [RHEL-114436]
  • ibmvnic: Add stat for tx direct vs tx batched (Mamatha Inamdar) [RHEL-114436]
  • nfsd: don't ignore the return code of svc_proc_register() (Olga Kornievskaia) [RHEL-93610] {CVE-2025-22026}
  • irdma: free iwdev->rf after removing MSI-X (CKI Backport Bot) [RHEL-111485]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.55.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.55.1.0.1.el9_6

kernel-tools

5.14.0-570.55.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.55.1.0.1.el9_6

python3-perf

5.14.0-570.55.1.0.1.el9_6

kernel-headers

5.14.0-570.55.1.0.1.el9_6

perf

5.14.0-570.55.1.0.1.el9_6

rtla

5.14.0-570.55.1.0.1.el9_6

rv

5.14.0-570.55.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.55.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.55.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.55.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.55.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.55.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.55.1.0.1.el9_6

kernel-devel

5.14.0-570.55.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.55.1.0.1.el9_6

kernel-doc

5.14.0-570.55.1.0.1.el9_6

kernel-headers

5.14.0-570.55.1.0.1.el9_6

perf

5.14.0-570.55.1.0.1.el9_6

rtla

5.14.0-570.55.1.0.1.el9_6

rv

5.14.0-570.55.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.55.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.55.1.0.1.el9_6

libperf

5.14.0-570.55.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.55.1.0.1.el9_6

kernel-core

5.14.0-570.55.1.0.1.el9_6

kernel-debug

5.14.0-570.55.1.0.1.el9_6

kernel-debug-core

5.14.0-570.55.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.55.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.55.1.0.1.el9_6

kernel-modules

5.14.0-570.55.1.0.1.el9_6

kernel-modules-core

5.14.0-570.55.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.55.1.0.1.el9_6

kernel-tools

5.14.0-570.55.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.55.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.55.1.0.1.el9_6

python3-perf

5.14.0-570.55.1.0.1.el9_6

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

CVSS3: 7
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: f ...

rocky
30 дней назад

Moderate: kernel security update