Описание
ELSA-2025-20719: Unbreakable Enterprise kernel security update (IMPORTANT)
[6.12.0-104.43.4.3]
- io_uring/futex: ensure io_futex_wait() cleans up properly on failure (Jens Axboe) [Orabug: 38572958] {CVE-2025-39698}
- fs: writeback: fix use-after-free in __mark_inode_dirty() (Jiufei Xue) [Orabug: 38572953] {CVE-2025-39866}
- kernfs: Fix UAF in polling when open file is released (Chen Ridong) [Orabug: 38572951] {CVE-2025-3988}
- vsock/virtio: Validate length in packet header before skb_put() (Will Deacon) [Orabug: 38572950] {CVE-2025-39718}
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (Herbert Xu) [Orabug: 38572948] {CVE-2025-39964}
- io_uring: fix incorrect io_kiocb reference in io_link_skb (Yang Xiuwei) [Orabug: 38572947] {CVE-2025-39963}
- xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (Sabrina Dubroca) [Orabug: 38572946] {CVE-2025-39965}
- tls: make sure to abort the stream if headers are bogus (Jakub Kicinski) [Orabug: 38572944] {CVE-2025-39946}
- futex: Prevent use-after-free during requeue-PI (Sebastian Andrzej Siewior) [Orabug: 38572943] {CVE-2025-39977}
- i40e: add validation for ring_len param (Lukasz Czapnik) [Orabug: 38572941] {CVE-2025-39973}
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
kernel-uek
6.12.0-104.43.4.3.el10uek
kernel-uek-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-devel
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-deprecated
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-desktop
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-extra
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-extra-netfilter
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-usb
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-wireless
6.12.0-104.43.4.3.el10uek
kernel-uek-devel
6.12.0-104.43.4.3.el10uek
kernel-uek-modules
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-core
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-deprecated
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-desktop
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-extra
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-extra-netfilter
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-usb
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-wireless
6.12.0-104.43.4.3.el10uek
kernel-uek-tools
6.12.0-104.43.4.3.el10uek
kernel-uek64k
6.12.0-104.43.4.3.el10uek
kernel-uek64k-core
6.12.0-104.43.4.3.el10uek
kernel-uek64k-devel
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-core
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-deprecated
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-desktop
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-extra
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-extra-netfilter
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-usb
6.12.0-104.43.4.3.el10uek
kernel-uek64k-modules-wireless
6.12.0-104.43.4.3.el10uek
Oracle Linux x86_64
kernel-uek
6.12.0-104.43.4.3.el10uek
kernel-uek-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-devel
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-core
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-deprecated
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-desktop
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-extra
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-extra-netfilter
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-usb
6.12.0-104.43.4.3.el10uek
kernel-uek-debug-modules-wireless
6.12.0-104.43.4.3.el10uek
kernel-uek-devel
6.12.0-104.43.4.3.el10uek
kernel-uek-doc
6.12.0-104.43.4.3.el10uek
kernel-uek-modules
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-core
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-deprecated
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-desktop
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-extra
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-extra-netfilter
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-usb
6.12.0-104.43.4.3.el10uek
kernel-uek-modules-wireless
6.12.0-104.43.4.3.el10uek
kernel-uek-tools
6.12.0-104.43.4.3.el10uek
Oracle Linux 9
Oracle Linux aarch64
kernel-uek
6.12.0-104.43.4.3.el9uek
kernel-uek-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-devel
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-deprecated
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-desktop
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-extra
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-extra-netfilter
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-usb
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-wireless
6.12.0-104.43.4.3.el9uek
kernel-uek-devel
6.12.0-104.43.4.3.el9uek
kernel-uek-modules
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-core
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-deprecated
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-desktop
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-extra
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-extra-netfilter
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-usb
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-wireless
6.12.0-104.43.4.3.el9uek
kernel-uek-tools
6.12.0-104.43.4.3.el9uek
kernel-uek64k
6.12.0-104.43.4.3.el9uek
kernel-uek64k-core
6.12.0-104.43.4.3.el9uek
kernel-uek64k-devel
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-core
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-deprecated
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-desktop
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-extra
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-extra-netfilter
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-usb
6.12.0-104.43.4.3.el9uek
kernel-uek64k-modules-wireless
6.12.0-104.43.4.3.el9uek
Oracle Linux x86_64
kernel-uek
6.12.0-104.43.4.3.el9uek
kernel-uek-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-devel
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-core
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-deprecated
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-desktop
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-extra
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-extra-netfilter
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-usb
6.12.0-104.43.4.3.el9uek
kernel-uek-debug-modules-wireless
6.12.0-104.43.4.3.el9uek
kernel-uek-devel
6.12.0-104.43.4.3.el9uek
kernel-uek-doc
6.12.0-104.43.4.3.el9uek
kernel-uek-modules
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-core
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-deprecated
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-desktop
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-extra
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-extra-netfilter
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-usb
6.12.0-104.43.4.3.el9uek
kernel-uek-modules-wireless
6.12.0-104.43.4.3.el9uek
kernel-uek-tools
6.12.0-104.43.4.3.el9uek
Ссылки на источники
Связанные уязвимости
ELSA-2025-20649: Unbreakable Enterprise kernel security update (IMPORTANT)
In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker ---------------------------------------...
In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker ---------------------------------------...
In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __mark_inode_dirty+0x124/0x418 lr : __mark_inode_dirty+0x118/0x418 sp : ffffffc08c9dbbc0 ........ Call trace: __mark_inode_dirty+0x124/0x418 generic_update_time+0x4c/0x60 file_modified+0xcc/0xd0 ext4_buffered_write_iter+0x58/0x124 ext4_file_write_iter+0x54/0x704 vfs_write+0x1c0/0x308 ksys_write+0x74/0x10c __arm64_sys_write+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x40/0xe4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x194/0x198 Root cause is: systemd-random-seed kworker -----------------------