Описание
ELSA-2025-9880: kernel security update (MODERATE)
[5.14.0-570.24.1.0.1_6.OL9]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-570.24.1_6]
- Squashfs: fix handling and sanity checking of xattr_ids count (CKI Backport Bot) [RHEL-93465] {CVE-2023-52933}
- net/mlx5: Fill out devlink dev info only for PFs (CKI Backport Bot) [RHEL-93770]
- dm mpath: replace spin_lock_irqsave with spin_lock_irq (Benjamin Marzinski) [RHEL-89487]
- dm-mpath: Don't grab work_mutex while probing paths (Benjamin Marzinski) [RHEL-89487]
- dm mpath: Interface for explicit probing of active paths (Benjamin Marzinski) [RHEL-89487]
- dm: Allow .prepare_ioctl to handle ioctls directly (Benjamin Marzinski) [RHEL-89487]
- NFS: O_DIRECT writes must check and adjust the file length (Benjamin Coddington) [RHEL-96060]
- pnfs/flexfiles: retry getting layout segment for reads (Benjamin Coddington) [RHEL-96060]
- NFS/pnfs: Fix a live lock between recalled layouts and layoutget (Benjamin Coddington) [RHEL-96060]
- x86/tsc: Use topology_max_packages() to get package number (David Arcari) [RHEL-96886]
- scsi: storvsc: Explicitly set max_segment_size to UINT_MAX (Ewan D. Milne) [RHEL-97519]
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-570.24.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.24.1.0.1.el9_6
kernel-headers
5.14.0-570.24.1.0.1.el9_6
perf
5.14.0-570.24.1.0.1.el9_6
rtla
5.14.0-570.24.1.0.1.el9_6
rv
5.14.0-570.24.1.0.1.el9_6
kernel-tools
5.14.0-570.24.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.24.1.0.1.el9_6
python3-perf
5.14.0-570.24.1.0.1.el9_6
Oracle Linux x86_64
kernel
5.14.0-570.24.1.0.1.el9_6
kernel-abi-stablelists
5.14.0-570.24.1.0.1.el9_6
kernel-core
5.14.0-570.24.1.0.1.el9_6
kernel-debug
5.14.0-570.24.1.0.1.el9_6
kernel-debug-core
5.14.0-570.24.1.0.1.el9_6
kernel-debug-modules
5.14.0-570.24.1.0.1.el9_6
kernel-debug-modules-core
5.14.0-570.24.1.0.1.el9_6
kernel-debug-modules-extra
5.14.0-570.24.1.0.1.el9_6
kernel-debug-uki-virt
5.14.0-570.24.1.0.1.el9_6
kernel-modules
5.14.0-570.24.1.0.1.el9_6
kernel-modules-core
5.14.0-570.24.1.0.1.el9_6
kernel-modules-extra
5.14.0-570.24.1.0.1.el9_6
kernel-tools
5.14.0-570.24.1.0.1.el9_6
kernel-tools-libs
5.14.0-570.24.1.0.1.el9_6
kernel-uki-virt
5.14.0-570.24.1.0.1.el9_6
kernel-uki-virt-addons
5.14.0-570.24.1.0.1.el9_6
python3-perf
5.14.0-570.24.1.0.1.el9_6
kernel-debug-devel
5.14.0-570.24.1.0.1.el9_6
kernel-debug-devel-matched
5.14.0-570.24.1.0.1.el9_6
kernel-devel
5.14.0-570.24.1.0.1.el9_6
kernel-devel-matched
5.14.0-570.24.1.0.1.el9_6
kernel-doc
5.14.0-570.24.1.0.1.el9_6
kernel-headers
5.14.0-570.24.1.0.1.el9_6
perf
5.14.0-570.24.1.0.1.el9_6
rtla
5.14.0-570.24.1.0.1.el9_6
rv
5.14.0-570.24.1.0.1.el9_6
kernel-cross-headers
5.14.0-570.24.1.0.1.el9_6
kernel-tools-libs-devel
5.14.0-570.24.1.0.1.el9_6
libperf
5.14.0-570.24.1.0.1.el9_6
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded up by...
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded up by...
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded u
In the Linux kernel, the following vulnerability has been resolved: S ...
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounde...