Описание
ELSA-2025-20066: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.15.0-304.171.4.3]
- NFSD: Limit the number of concurrent async COPY operations (Chuck Lever) [Orabug: 37516381] {CVE-2024-49974}
- NFSD: Async COPY result needs to return a write verifier (Chuck Lever) [Orabug: 37516381] {CVE-2024-49974}
- security/keys: fix slab-out-of-bounds in key_task_permission (Chen Ridong) [Orabug: 37516370] {CVE-2024-50301}
- macsec: Fix use-after-free while sending the offloading packet (Jianbo Liu) [Orabug: 37516375] {CVE-2024-50261}
[5.15.0-304.171.4.2]
- PCI: Fix pci_enable_acs() support for the ACS quirks (Jason Gunthorpe) [Orabug: 37492139]
- PCI: Clear Secondary Status errors after enumeration (Vidya Sagar) [Orabug: 37492139]
- PCI/AER: Configure ECRC only if AER is native (Vidya Sagar) [Orabug: 37492139]
- PCI: Extend ACS configurability (Vidya Sagar) [Orabug: 37492139]
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
5.15.0-304.171.4.3.el8uek
kernel-uek
5.15.0-304.171.4.3.el8uek
kernel-uek-container
5.15.0-304.171.4.3.el8uek
kernel-uek-container-debug
5.15.0-304.171.4.3.el8uek
kernel-uek-core
5.15.0-304.171.4.3.el8uek
kernel-uek-debug
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-core
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-devel
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-modules
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-modules-extra
5.15.0-304.171.4.3.el8uek
kernel-uek-devel
5.15.0-304.171.4.3.el8uek
kernel-uek-doc
5.15.0-304.171.4.3.el8uek
kernel-uek-modules
5.15.0-304.171.4.3.el8uek
kernel-uek-modules-extra
5.15.0-304.171.4.3.el8uek
Oracle Linux x86_64
bpftool
5.15.0-304.171.4.3.el8uek
kernel-uek
5.15.0-304.171.4.3.el8uek
kernel-uek-container
5.15.0-304.171.4.3.el8uek
kernel-uek-container-debug
5.15.0-304.171.4.3.el8uek
kernel-uek-core
5.15.0-304.171.4.3.el8uek
kernel-uek-debug
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-core
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-devel
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-modules
5.15.0-304.171.4.3.el8uek
kernel-uek-debug-modules-extra
5.15.0-304.171.4.3.el8uek
kernel-uek-devel
5.15.0-304.171.4.3.el8uek
kernel-uek-doc
5.15.0-304.171.4.3.el8uek
kernel-uek-modules
5.15.0-304.171.4.3.el8uek
kernel-uek-modules-extra
5.15.0-304.171.4.3.el8uek
Oracle Linux 9
Oracle Linux aarch64
bpftool
5.15.0-304.171.4.3.el9uek
kernel-uek
5.15.0-304.171.4.3.el9uek
kernel-uek-container
5.15.0-304.171.4.3.el9uek
kernel-uek-container-debug
5.15.0-304.171.4.3.el9uek
kernel-uek-core
5.15.0-304.171.4.3.el9uek
kernel-uek-debug
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-core
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-devel
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-modules
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-modules-extra
5.15.0-304.171.4.3.el9uek
kernel-uek-devel
5.15.0-304.171.4.3.el9uek
kernel-uek-doc
5.15.0-304.171.4.3.el9uek
kernel-uek-modules
5.15.0-304.171.4.3.el9uek
kernel-uek-modules-extra
5.15.0-304.171.4.3.el9uek
Oracle Linux x86_64
bpftool
5.15.0-304.171.4.3.el9uek
kernel-uek
5.15.0-304.171.4.3.el9uek
kernel-uek-container
5.15.0-304.171.4.3.el9uek
kernel-uek-container-debug
5.15.0-304.171.4.3.el9uek
kernel-uek-core
5.15.0-304.171.4.3.el9uek
kernel-uek-debug
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-core
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-devel
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-modules
5.15.0-304.171.4.3.el9uek
kernel-uek-debug-modules-extra
5.15.0-304.171.4.3.el9uek
kernel-uek-devel
5.15.0-304.171.4.3.el9uek
kernel-uek-doc
5.15.0-304.171.4.3.el9uek
kernel-uek-modules
5.15.0-304.171.4.3.el9uek
kernel-uek-modules-extra
5.15.0-304.171.4.3.el9uek
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out of bounds read: BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36 BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline] BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410 security/keys/permission.c:54 Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362 CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15 Call Trace: __dump_stack lib/dump_stack.c:82 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:123 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560 kasan_report+0x3a/0x50 mm/kasan/report.c:585 __kuid_val include/linux/uidgid.h:36 [inline] uid_eq include/linux/uidgid.h:63 [inline] key_task_permission+0x394/0x410 security/keys/permission.c:54 search_nested_keyrings+0x90e/0...
In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out of bounds read: BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36 BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline] BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410 security/keys/permission.c:54 Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362 CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15 Call Trace: __dump_stack lib/dump_stack.c:82 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:123 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560 kasan_report+0x3a/0x50 mm/kasan/report.c:585 __kuid_val include/linux/uidgid.h:36 [inline] uid_eq include/linux/uidgid.h:63 [inline] key_task_permission+0x394/0x410 security/keys/permission.c:54 search_nested_keyrings+0x90e/0xe9...
In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out of bounds read: BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36 BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline] BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410 security/keys/permission.c:54 Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362 CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15 Call Trace: __dump_stack lib/dump_stack.c:82 [inline] dump_stack+0x107/0x167 lib/dump_stack.c:123 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560 kasan_report+0x3a/0x50 mm/kasan/report.c:585 __kuid_val include/linux/uidgid.h:36 [inline] uid_eq include/linux/uidgid.h:63 [inline] key_task_permission+0x394/0x410 security/keys/permission.c:54 search_nested_keyrings+0
In the Linux kernel, the following vulnerability has been resolved: s ...