Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-20645

Опубликовано: 29 сент. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8
Платформа: Oracle Linux 7

Описание

ELSA-2025-20645: Unbreakable Enterprise kernel security update (IMPORTANT)

[5.4.17-2136.347.6.3]

  • uek-rpm: Move ifb module to nano modules (Harshit Mogalapalli) [Orabug: 38462132]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-uek

5.4.17-2136.347.6.3.el8uek

kernel-uek-debug

5.4.17-2136.347.6.3.el8uek

kernel-uek-debug-devel

5.4.17-2136.347.6.3.el8uek

kernel-uek-devel

5.4.17-2136.347.6.3.el8uek

kernel-uek-doc

5.4.17-2136.347.6.3.el8uek

Oracle Linux x86_64

kernel-uek

5.4.17-2136.347.6.3.el8uek

kernel-uek-container

5.4.17-2136.347.6.3.el8uek

kernel-uek-container-debug

5.4.17-2136.347.6.3.el8uek

kernel-uek-debug

5.4.17-2136.347.6.3.el8uek

kernel-uek-debug-devel

5.4.17-2136.347.6.3.el8uek

kernel-uek-devel

5.4.17-2136.347.6.3.el8uek

kernel-uek-doc

5.4.17-2136.347.6.3.el8uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

5.4.17-2136.347.6.3.el7uek

kernel-uek-container

5.4.17-2136.347.6.3.el7uek

kernel-uek-container-debug

5.4.17-2136.347.6.3.el7uek

kernel-uek-debug

5.4.17-2136.347.6.3.el7uek

kernel-uek-debug-devel

5.4.17-2136.347.6.3.el7uek

kernel-uek-devel

5.4.17-2136.347.6.3.el7uek

kernel-uek-doc

5.4.17-2136.347.6.3.el7uek

kernel-uek-tools

5.4.17-2136.347.6.3.el7uek

Связанные уязвимости

oracle-oval
8 дней назад

ELSA-2025-20632: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
10 дней назад

ELSA-2025-20609: Unbreakable Enterprise kernel security update (IMPORTANT)

suse-cvrf
8 дней назад

Security update for the Linux Kernel

ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.

CVSS3: 6.2
redhat
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it will result in an extra refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep the binding until socket destruction). Modify the check in __vsock_bind_connectible() to also prevent binding to VMADDR_PORT_ANY.