Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-9880

Опубликовано: 30 июн. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-9880: kernel security update (MODERATE)

[5.14.0-570.24.1.0.1_6.OL9]

  • nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.24.1_6]

  • Squashfs: fix handling and sanity checking of xattr_ids count (CKI Backport Bot) [RHEL-93465] {CVE-2023-52933}
  • net/mlx5: Fill out devlink dev info only for PFs (CKI Backport Bot) [RHEL-93770]
  • dm mpath: replace spin_lock_irqsave with spin_lock_irq (Benjamin Marzinski) [RHEL-89487]
  • dm-mpath: Don't grab work_mutex while probing paths (Benjamin Marzinski) [RHEL-89487]
  • dm mpath: Interface for explicit probing of active paths (Benjamin Marzinski) [RHEL-89487]
  • dm: Allow .prepare_ioctl to handle ioctls directly (Benjamin Marzinski) [RHEL-89487]
  • NFS: O_DIRECT writes must check and adjust the file length (Benjamin Coddington) [RHEL-96060]
  • pnfs/flexfiles: retry getting layout segment for reads (Benjamin Coddington) [RHEL-96060]
  • NFS/pnfs: Fix a live lock between recalled layouts and layoutget (Benjamin Coddington) [RHEL-96060]
  • x86/tsc: Use topology_max_packages() to get package number (David Arcari) [RHEL-96886]
  • scsi: storvsc: Explicitly set max_segment_size to UINT_MAX (Ewan D. Milne) [RHEL-97519]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-570.24.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.24.1.0.1.el9_6

kernel-headers

5.14.0-570.24.1.0.1.el9_6

perf

5.14.0-570.24.1.0.1.el9_6

rtla

5.14.0-570.24.1.0.1.el9_6

rv

5.14.0-570.24.1.0.1.el9_6

kernel-tools

5.14.0-570.24.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.24.1.0.1.el9_6

python3-perf

5.14.0-570.24.1.0.1.el9_6

Oracle Linux x86_64

kernel

5.14.0-570.24.1.0.1.el9_6

kernel-abi-stablelists

5.14.0-570.24.1.0.1.el9_6

kernel-core

5.14.0-570.24.1.0.1.el9_6

kernel-debug

5.14.0-570.24.1.0.1.el9_6

kernel-debug-core

5.14.0-570.24.1.0.1.el9_6

kernel-debug-modules

5.14.0-570.24.1.0.1.el9_6

kernel-debug-modules-core

5.14.0-570.24.1.0.1.el9_6

kernel-debug-modules-extra

5.14.0-570.24.1.0.1.el9_6

kernel-debug-uki-virt

5.14.0-570.24.1.0.1.el9_6

kernel-modules

5.14.0-570.24.1.0.1.el9_6

kernel-modules-core

5.14.0-570.24.1.0.1.el9_6

kernel-modules-extra

5.14.0-570.24.1.0.1.el9_6

kernel-tools

5.14.0-570.24.1.0.1.el9_6

kernel-tools-libs

5.14.0-570.24.1.0.1.el9_6

kernel-uki-virt

5.14.0-570.24.1.0.1.el9_6

kernel-uki-virt-addons

5.14.0-570.24.1.0.1.el9_6

python3-perf

5.14.0-570.24.1.0.1.el9_6

kernel-debug-devel

5.14.0-570.24.1.0.1.el9_6

kernel-debug-devel-matched

5.14.0-570.24.1.0.1.el9_6

kernel-devel

5.14.0-570.24.1.0.1.el9_6

kernel-devel-matched

5.14.0-570.24.1.0.1.el9_6

kernel-doc

5.14.0-570.24.1.0.1.el9_6

kernel-headers

5.14.0-570.24.1.0.1.el9_6

perf

5.14.0-570.24.1.0.1.el9_6

rtla

5.14.0-570.24.1.0.1.el9_6

rv

5.14.0-570.24.1.0.1.el9_6

kernel-cross-headers

5.14.0-570.24.1.0.1.el9_6

kernel-tools-libs-devel

5.14.0-570.24.1.0.1.el9_6

libperf

5.14.0-570.24.1.0.1.el9_6

Связанные CVE

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded up by...

CVSS3: 7.1
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded up by...

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounded u

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: S ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix handling and sanity checking of xattr_ids count A Sysbot [1] corrupted filesystem exposes two flaws in the handling and sanity checking of the xattr_ids count in the filesystem. Both of these flaws cause computation overflow due to incorrect typing. In the corrupted filesystem the xattr_ids value is 4294967071, which stored in a signed variable becomes the negative number -225. Flaw 1 (64-bit systems only): The signed integer xattr_ids variable causes sign extension. This causes variable overflow in the SQUASHFS_XATTR_*(A) macros. The variable is first multiplied by sizeof(struct squashfs_xattr_id) where the type of the sizeof operator is "unsigned long". On a 64-bit system this is 64-bits in size, and causes the negative number to be sign extended and widened to 64-bits and then become unsigned. This produces the very large number 18446744073709548016 or 2^64 - 3600. This number when rounde...