Описание
ELSA-2025-20721: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.15.0-313.189.5.2]
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (Jeff Layton) [Orabug: 38575798] {CVE-2025-38724}
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx (Eric Biggers) [Orabug: 38575792]
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (Herbert Xu) [Orabug: 38575792] {CVE-2025-39964}
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
5.15.0-313.189.5.2.el8uek
kernel-uek
5.15.0-313.189.5.2.el8uek
kernel-uek-container
5.15.0-313.189.5.2.el8uek
kernel-uek-container-debug
5.15.0-313.189.5.2.el8uek
kernel-uek-core
5.15.0-313.189.5.2.el8uek
kernel-uek-debug
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-core
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-devel
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-modules
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-modules-extra
5.15.0-313.189.5.2.el8uek
kernel-uek-devel
5.15.0-313.189.5.2.el8uek
kernel-uek-doc
5.15.0-313.189.5.2.el8uek
kernel-uek-modules
5.15.0-313.189.5.2.el8uek
kernel-uek-modules-extra
5.15.0-313.189.5.2.el8uek
Oracle Linux x86_64
bpftool
5.15.0-313.189.5.2.el8uek
kernel-uek
5.15.0-313.189.5.2.el8uek
kernel-uek-container
5.15.0-313.189.5.2.el8uek
kernel-uek-container-debug
5.15.0-313.189.5.2.el8uek
kernel-uek-core
5.15.0-313.189.5.2.el8uek
kernel-uek-debug
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-core
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-devel
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-modules
5.15.0-313.189.5.2.el8uek
kernel-uek-debug-modules-extra
5.15.0-313.189.5.2.el8uek
kernel-uek-devel
5.15.0-313.189.5.2.el8uek
kernel-uek-doc
5.15.0-313.189.5.2.el8uek
kernel-uek-modules
5.15.0-313.189.5.2.el8uek
kernel-uek-modules-extra
5.15.0-313.189.5.2.el8uek
Oracle Linux 9
Oracle Linux aarch64
bpftool
5.15.0-313.189.5.2.el9uek
kernel-uek
5.15.0-313.189.5.2.el9uek
kernel-uek-container
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-core
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-devel
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-modules
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-modules-extra
5.15.0-313.189.5.2.el9uek
kernel-uek-devel
5.15.0-313.189.5.2.el9uek
kernel-uek-doc
5.15.0-313.189.5.2.el9uek
kernel-uek-modules
5.15.0-313.189.5.2.el9uek
kernel-uek-modules-extra
5.15.0-313.189.5.2.el9uek
kernel-uek64k
5.15.0-313.189.5.2.el9uek
kernel-uek64k-core
5.15.0-313.189.5.2.el9uek
kernel-uek64k-devel
5.15.0-313.189.5.2.el9uek
kernel-uek64k-modules
5.15.0-313.189.5.2.el9uek
kernel-uek64k-modules-extra
5.15.0-313.189.5.2.el9uek
kernel-uek-container-debug
5.15.0-313.189.5.2.el9uek
kernel-uek-core
5.15.0-313.189.5.2.el9uek
kernel-uek-debug
5.15.0-313.189.5.2.el9uek
Oracle Linux x86_64
bpftool
5.15.0-313.189.5.2.el9uek
kernel-uek
5.15.0-313.189.5.2.el9uek
kernel-uek-container
5.15.0-313.189.5.2.el9uek
kernel-uek-container-debug
5.15.0-313.189.5.2.el9uek
kernel-uek-core
5.15.0-313.189.5.2.el9uek
kernel-uek-debug
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-core
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-devel
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-modules
5.15.0-313.189.5.2.el9uek
kernel-uek-debug-modules-extra
5.15.0-313.189.5.2.el9uek
kernel-uek-devel
5.15.0-313.189.5.2.el9uek
kernel-uek-doc
5.15.0-313.189.5.2.el9uek
kernel-uek-modules
5.15.0-313.189.5.2.el9uek
kernel-uek-modules-extra
5.15.0-313.189.5.2.el9uek
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two writes to the same af_alg socket is bogus as the data will be interleaved in an unpredictable fashion. Furthermore, concurrent writes may create inconsistencies in the internal socket state. Disallow this by adding a new ctx->write field that indiciates exclusive ownership for writing.
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two writes to the same af_alg socket is bogus as the data will be interleaved in an unpredictable fashion. Furthermore, concurrent writes may create inconsistencies in the internal socket state. Disallow this by adding a new ctx->write field that indiciates exclusive ownership for writing.
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two writes to the same af_alg socket is bogus as the data will be interleaved in an unpredictable fashion. Furthermore, concurrent writes may create inconsistencies in the internal socket state. Disallow this by adding a new ctx->write field that indiciates exclusive ownership for writing.
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
In the Linux kernel, the following vulnerability has been resolved: c ...