Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-20719

Опубликовано: 24 окт. 2025
Источник: oracle-oval
Платформа: Oracle Linux 10
Платформа: Oracle Linux 9

Описание

ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)

[6.12.0-104.43.4.3]

  • io_uring/futex: ensure io_futex_wait() cleans up properly on failure (Jens Axboe) [Orabug: 38572958] {CVE-2025-39698}
  • fs: writeback: fix use-after-free in __mark_inode_dirty() (Jiufei Xue) [Orabug: 38572953] {CVE-2025-39866}
  • kernfs: Fix UAF in polling when open file is released (Chen Ridong) [Orabug: 38572951] {CVE-2025-3988}
  • vsock/virtio: Validate length in packet header before skb_put() (Will Deacon) [Orabug: 38572950] {CVE-2025-39718}
  • crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (Herbert Xu) [Orabug: 38572948] {CVE-2025-39964}
  • io_uring: fix incorrect io_kiocb reference in io_link_skb (Yang Xiuwei) [Orabug: 38572947] {CVE-2025-39963}
  • xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (Sabrina Dubroca) [Orabug: 38572946] {CVE-2025-39965}
  • tls: make sure to abort the stream if headers are bogus (Jakub Kicinski) [Orabug: 38572944] {CVE-2025-39946}
  • futex: Prevent use-after-free during requeue-PI (Sebastian Andrzej Siewior) [Orabug: 38572943] {CVE-2025-39977}
  • i40e: add validation for ring_len param (Lukasz Czapnik) [Orabug: 38572941] {CVE-2025-39973}

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

kernel-uek

6.12.0-104.43.4.3.el10uek

kernel-uek-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-devel

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-deprecated

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-desktop

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-extra

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-extra-netfilter

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-usb

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-wireless

6.12.0-104.43.4.3.el10uek

kernel-uek-devel

6.12.0-104.43.4.3.el10uek

kernel-uek-modules

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-core

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-deprecated

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-desktop

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-extra

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-extra-netfilter

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-usb

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-wireless

6.12.0-104.43.4.3.el10uek

kernel-uek-tools

6.12.0-104.43.4.3.el10uek

kernel-uek64k

6.12.0-104.43.4.3.el10uek

kernel-uek64k-core

6.12.0-104.43.4.3.el10uek

kernel-uek64k-devel

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-core

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-deprecated

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-desktop

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-extra

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-extra-netfilter

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-usb

6.12.0-104.43.4.3.el10uek

kernel-uek64k-modules-wireless

6.12.0-104.43.4.3.el10uek

Oracle Linux x86_64

kernel-uek

6.12.0-104.43.4.3.el10uek

kernel-uek-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-devel

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-core

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-deprecated

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-desktop

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-extra

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-extra-netfilter

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-usb

6.12.0-104.43.4.3.el10uek

kernel-uek-debug-modules-wireless

6.12.0-104.43.4.3.el10uek

kernel-uek-devel

6.12.0-104.43.4.3.el10uek

kernel-uek-doc

6.12.0-104.43.4.3.el10uek

kernel-uek-modules

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-core

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-deprecated

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-desktop

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-extra

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-extra-netfilter

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-usb

6.12.0-104.43.4.3.el10uek

kernel-uek-modules-wireless

6.12.0-104.43.4.3.el10uek

kernel-uek-tools

6.12.0-104.43.4.3.el10uek

Oracle Linux 9

Oracle Linux aarch64

kernel-uek

6.12.0-104.43.4.3.el9uek

kernel-uek-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-devel

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-deprecated

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-desktop

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-extra

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-extra-netfilter

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-usb

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-wireless

6.12.0-104.43.4.3.el9uek

kernel-uek-devel

6.12.0-104.43.4.3.el9uek

kernel-uek-modules

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-core

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-deprecated

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-desktop

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-extra

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-extra-netfilter

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-usb

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-wireless

6.12.0-104.43.4.3.el9uek

kernel-uek-tools

6.12.0-104.43.4.3.el9uek

kernel-uek64k

6.12.0-104.43.4.3.el9uek

kernel-uek64k-core

6.12.0-104.43.4.3.el9uek

kernel-uek64k-devel

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-core

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-deprecated

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-desktop

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-extra

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-extra-netfilter

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-usb

6.12.0-104.43.4.3.el9uek

kernel-uek64k-modules-wireless

6.12.0-104.43.4.3.el9uek

Oracle Linux x86_64

kernel-uek

6.12.0-104.43.4.3.el9uek

kernel-uek-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-devel

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-core

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-deprecated

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-desktop

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-extra

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-extra-netfilter

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-usb

6.12.0-104.43.4.3.el9uek

kernel-uek-debug-modules-wireless

6.12.0-104.43.4.3.el9uek

kernel-uek-devel

6.12.0-104.43.4.3.el9uek

kernel-uek-doc

6.12.0-104.43.4.3.el9uek

kernel-uek-modules

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-core

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-deprecated

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-desktop

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-extra

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-extra-netfilter

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-usb

6.12.0-104.43.4.3.el9uek

kernel-uek-modules-wireless

6.12.0-104.43.4.3.el9uek

kernel-uek-tools

6.12.0-104.43.4.3.el9uek

Связанные уязвимости

oracle-oval
около 1 месяца назад

ELSA-2025-20649: Unbreakable Enterprise kernel security update (IMPORTANT)

ubuntu
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker ---------------------------------------...

CVSS3: 7
redhat
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker ---------------------------------------...

nvd
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker -----------------------

msrc
около 2 месяцев назад

fs: writeback: fix use-after-free in __mark_inode_dirty()