Описание
ELSA-2025-2473: kernel security update (IMPORTANT)
[4.18.0-553.44.1_10.OL8]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
[4.18.0-553.44.1_10]
- HID: core: zero-initialize the report buffer (CKI Backport Bot) [RHEL-81825] {CVE-2024-50302}
- ALSA: usb-audio: Fix a DMA to stack memory bug (Jaroslav Kysela) [RHEL-81786]
- ALSA: usb-audio: Fix for sampling rates support for Mbox3 (Jaroslav Kysela) [RHEL-81786]
- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (Jaroslav Kysela) [RHEL-81786] {CVE-2024-53197}
- ALSA: usb-audio: Add sampling rates support for Mbox3 (Jaroslav Kysela) [RHEL-81786]
[4.18.0-553.43.1_10]
- s390/module: fix loading modules with a lot of relocations (Mete Durlu) [RHEL-78999]
- s390/module: Use s390_kernel_write() for late relocations (Mete Durlu) [RHEL-78999]
- locking/atomic: Make test_and_*_bit() ordered on failure (Herton R. Krzesinski) [RHEL-69894]
- pps: Fix a use-after-free (Michal Schmidt) [RHEL-77971]
- KVM: s390: Change virtual to physical address access in diag 0x258 handler (Thomas Huth) [RHEL-68323 RHEL-65229]
- KVM: s390: gaccess: Check if guest address is in memslot (Thomas Huth) [RHEL-68323 RHEL-65229]
- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (Thomas Huth) [RHEL-68323 RHEL-65229]
- s390/uv: Panic for set and remove shared access UVC errors (Thomas Huth) [RHEL-68323 RHEL-65229]
- KVM: s390: vsie: Use virt_to_phys for crypto control block (Thomas Huth) [RHEL-68323 RHEL-65229]
- KVM: s390: vsie: Use virt_to_phys for facility control block (Thomas Huth) [RHEL-68323 RHEL-65229]
- scsi: megaraid_sas: Fix for a potential deadlock (Tomas Henzl) [RHEL-21984] {CVE-2024-57807}
- net/mlx5: Reload auxiliary devices in pci error handlers (Benjamin Poirier) [RHEL-78756]
- net/mlx5: Suspend auxiliary devices only in case of PCI device suspend (Benjamin Poirier) [RHEL-78756]
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
kernel-tools-libs-devel
4.18.0-553.44.1.el8_10
bpftool
4.18.0-553.44.1.el8_10
kernel-cross-headers
4.18.0-553.44.1.el8_10
kernel-headers
4.18.0-553.44.1.el8_10
kernel-tools
4.18.0-553.44.1.el8_10
kernel-tools-libs
4.18.0-553.44.1.el8_10
perf
4.18.0-553.44.1.el8_10
python3-perf
4.18.0-553.44.1.el8_10
Oracle Linux x86_64
kernel-tools-libs-devel
4.18.0-553.44.1.el8_10
bpftool
4.18.0-553.44.1.el8_10
kernel
4.18.0-553.44.1.el8_10
kernel-abi-stablelists
4.18.0-553.44.1.el8_10
kernel-core
4.18.0-553.44.1.el8_10
kernel-cross-headers
4.18.0-553.44.1.el8_10
kernel-debug
4.18.0-553.44.1.el8_10
kernel-debug-core
4.18.0-553.44.1.el8_10
kernel-debug-devel
4.18.0-553.44.1.el8_10
kernel-debug-modules
4.18.0-553.44.1.el8_10
kernel-debug-modules-extra
4.18.0-553.44.1.el8_10
kernel-devel
4.18.0-553.44.1.el8_10
kernel-doc
4.18.0-553.44.1.el8_10
kernel-headers
4.18.0-553.44.1.el8_10
kernel-modules
4.18.0-553.44.1.el8_10
kernel-modules-extra
4.18.0-553.44.1.el8_10
kernel-tools
4.18.0-553.44.1.el8_10
kernel-tools-libs
4.18.0-553.44.1.el8_10
perf
4.18.0-553.44.1.el8_10
python3-perf
4.18.0-553.44.1.el8_10
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.