Описание
ELSA-2025-8142: kernel security update (MODERATE)
[5.14.0-570.18.1.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
[5.14.0-570.18.1_6]
- gitlab-ci: use r.6 builder image (Michael Hofmann)
- cifs: Fix integer overflow while processing acregmax mount option (CKI Backport Bot) [RHEL-87921] {CVE-2025-21964}
- Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x (David Marlin) [RHEL-85647]
- drm/i915/dp_mst: Don't require DSC hblank quirk for a non-DSC compatible mode (Jocelyn Falempe) [RHEL-85393]
- drm/i915/dp_mst: Handle error during DSC BW overhead/slice calculation (Jocelyn Falempe) [RHEL-85393]
- drm/i915/display: Use joined pipes in dsc helpers for slices, bpp (Jocelyn Falempe) [RHEL-85393]
- drm/i915/display: Use joined pipes in intel_mode_valid_max_plane_size (Jocelyn Falempe) [RHEL-85393]
- drm/i915/display: Use joined pipes in intel_dp_joiner_needs_dsc (Jocelyn Falempe) [RHEL-85393]
- drm/i915/display: Simplify intel_joiner_num_pipes and its usage (Jocelyn Falempe) [RHEL-85393]
- drm/i915/display: Check whether platform supports joiner (Jocelyn Falempe) [RHEL-85393]
- Revert 'drm/i915/dp_mst: Handle error during DSC BW overhead/slice calculation' (Jocelyn Falempe) [RHEL-85393]
- Revert 'drm/i915/dp_mst: Don't require DSC hblank quirk for a non-DSC compatible mode' (Jocelyn Falempe) [RHEL-85393]
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.18.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.18.1.0.1.el9_6
kernel-headers
5.14.0-570.18.1.0.1.el9_6
perf
5.14.0-570.18.1.0.1.el9_6
rtla
5.14.0-570.18.1.0.1.el9_6
rv
5.14.0-570.18.1.0.1.el9_6
kernel-tools
5.14.0-570.18.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.18.1.0.1.el9_6
python3-perf
5.14.0-570.18.1.0.1.el9_6
Oracle Linux x86_64
kernel-debug-devel
5.14.0-570.18.1.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.18.1.0.1.el9_6
kernel-devel
5.14.0-570.18.1.0.1.el9_6
kernel-devel-matched
5.14.0-570.18.1.0.1.el9_6
kernel-doc
5.14.0-570.18.1.0.1.el9_6
kernel-headers
5.14.0-570.18.1.0.1.el9_6
perf
5.14.0-570.18.1.0.1.el9_6
rtla
5.14.0-570.18.1.0.1.el9_6
rv
5.14.0-570.18.1.0.1.el9_6
kernel-cross-headers
5.14.0-570.18.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.18.1.0.1.el9_6
libperf
5.14.0-570.18.1.0.1.el9_6
kernel
5.14.0-570.18.1.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.18.1.0.1.el9_6
kernel-core
5.14.0-570.18.1.0.1.el9_6
kernel-debug
5.14.0-570.18.1.0.1.el9_6
kernel-debug-core
5.14.0-570.18.1.0.1.el9_6
kernel-debug-modules
5.14.0-570.18.1.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.18.1.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.18.1.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.18.1.0.1.el9_6
kernel-modules
5.14.0-570.18.1.0.1.el9_6
kernel-modules-core
5.14.0-570.18.1.0.1.el9_6
kernel-modules-extra
5.14.0-570.18.1.0.1.el9_6
kernel-tools
5.14.0-570.18.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.18.1.0.1.el9_6
kernel-uki-virt
5.14.0-570.18.1.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.18.1.0.1.el9_6
python3-perf
5.14.0-570.18.1.0.1.el9_6
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: c ...