Описание
ELSA-2025-4341: kernel security update (IMPORTANT)
[5.14.0-503.40.1_5.OL9]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
[5.14.0-503.40.1_5]
- nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (Chris Leech) [RHEL-87479] {CVE-2025-21927}
- ipvs: properly dereference pe in ip_vs_add_service (Phil Sutter) [RHEL-75438] {CVE-2024-42322}
- bonding: fix null pointer deref in bond_ipsec_offload_ok (CKI Backport Bot) [RHEL-75453] {CVE-2024-44990}
- smb: client: don't retry IO on failed negprotos with soft mounts (Jay Shin) [RHEL-85523]
- bonding: Correctly support GSO ESP offload (CKI Backport Bot) [RHEL-73403]
- team: prevent adding a device which is already a team device lower (Hangbin Liu) [RHEL-73403]
- team: Fix feature exposure when no ports are present (Hangbin Liu) [RHEL-73403]
- team: Fix feature propagation of NETIF_F_GSO_ENCAP_ALL (Hangbin Liu) [RHEL-73403]
- team: Fix initial vlan_feature set in __team_compute_features (Hangbin Liu) [RHEL-73403]
- bonding: Fix feature propagation of NETIF_F_GSO_ENCAP_ALL (Hangbin Liu) [RHEL-73403]
- bonding: Fix initial {vlan,mpls}_feature set in bond_compute_features (Hangbin Liu) [RHEL-73403]
- net, team, bonding: Add netdev_base_features helper (Hangbin Liu) [RHEL-73403]
- bonding: add ESP offload features when slaves support (Hangbin Liu) [RHEL-73403]
- net: team: rename team to team_core for linking (Hangbin Liu) [RHEL-73403]
- netfilter: br_netfilter: fix panic with metadata_dst skb (Ivan Vecera) [RHEL-71956]
- bridge: mcast: Fail MDB get request on empty entry (Ivan Vecera) [RHEL-71956]
- net: stmmac: dwmac-tegra: Fix link bring-up sequence (Jose Ignacio Tornos Martinez) [RHEL-73478]
- kobject_uevent: Fix OOB access within zap_modalias_env() (CKI KWF BOT) [RHEL-75435] {CVE-2024-42292}
[5.14.0-503.39.1_5]
- igb: cope with large MAX_SKB_FRAGS (Corinna Vinschen) [RHEL-75552]
- x86/sev: Ensure that RMP table fixups are reserved (Bandan Das) [RHEL-84716]
- ELF: fix kernel.randomize_va_space double read (Rafael Aquini) [RHEL-75456] {CVE-2024-46826}
- smb: client: fix double put of @cfile in smb2_set_path_size() (Paulo Alcantara) [RHEL-79342] {CVE-2024-46796}
- smb: client: fix double put of @cfile in smb2_rename_path() (Paulo Alcantara) [RHEL-79342] {CVE-2024-46736}
- smb: client: fix FSCTL_GET_REPARSE_POINT against NetApp (Paulo Alcantara) [RHEL-79342]
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
python3-perf
5.14.0-503.40.1.el9_5
kernel-cross-headers
5.14.0-503.40.1.el9_5
kernel-tools-libs-devel
5.14.0-503.40.1.el9_5
bpftool
7.4.0-503.40.1.el9_5
kernel-tools
5.14.0-503.40.1.el9_5
kernel-tools-libs
5.14.0-503.40.1.el9_5
kernel-headers
5.14.0-503.40.1.el9_5
perf
5.14.0-503.40.1.el9_5
rtla
5.14.0-503.40.1.el9_5
rv
5.14.0-503.40.1.el9_5
Oracle Linux x86_64
bpftool
7.4.0-503.40.1.el9_5
kernel
5.14.0-503.40.1.el9_5
kernel-abi-stablelists
5.14.0-503.40.1.el9_5
kernel-core
5.14.0-503.40.1.el9_5
kernel-debug
5.14.0-503.40.1.el9_5
kernel-debug-core
5.14.0-503.40.1.el9_5
kernel-debug-modules
5.14.0-503.40.1.el9_5
kernel-debug-modules-core
5.14.0-503.40.1.el9_5
kernel-debug-modules-extra
5.14.0-503.40.1.el9_5
kernel-debug-uki-virt
5.14.0-503.40.1.el9_5
kernel-modules
5.14.0-503.40.1.el9_5
kernel-modules-core
5.14.0-503.40.1.el9_5
kernel-modules-extra
5.14.0-503.40.1.el9_5
kernel-tools
5.14.0-503.40.1.el9_5
kernel-tools-libs
5.14.0-503.40.1.el9_5
kernel-uki-virt
5.14.0-503.40.1.el9_5
kernel-uki-virt-addons
5.14.0-503.40.1.el9_5
python3-perf
5.14.0-503.40.1.el9_5
kernel-debug-devel
5.14.0-503.40.1.el9_5
kernel-debug-devel-matched
5.14.0-503.40.1.el9_5
kernel-devel
5.14.0-503.40.1.el9_5
kernel-devel-matched
5.14.0-503.40.1.el9_5
kernel-doc
5.14.0-503.40.1.el9_5
kernel-headers
5.14.0-503.40.1.el9_5
perf
5.14.0-503.40.1.el9_5
rtla
5.14.0-503.40.1.el9_5
rv
5.14.0-503.40.1.el9_5
kernel-cross-headers
5.14.0-503.40.1.el9_5
kernel-tools-libs-devel
5.14.0-503.40.1.el9_5
libperf
5.14.0-503.40.1.el9_5
Ссылки на источники
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
In the Linux kernel, the following vulnerability has been resolved: n ...
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.