Описание
ELSA-2026-0444: kernel security update (IMPORTANT)
[4.18.0-553.92.1]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]
[4.18.0-553.92.1]
- libceph: fix potential use-after-free in have_mon_and_osd_map() (CKI Backport Bot) [RHEL-137395] {CVE-2025-68285}
- media: rc: fix races with imon_disconnect() (Kate Hsuan) [RHEL-124396] {CVE-2025-39993}
- media: imon: fix a race condition in send_packet() (Kate Hsuan) [RHEL-124396]
- media: imon: reorganize serialization (Kate Hsuan) [RHEL-124396]
- media: imon: drop references only after device is no longer used (Kate Hsuan) [RHEL-124396]
- media: rc: Add support for another iMON 0xffdc device (Kate Hsuan) [RHEL-124396]
[4.18.0-553.91.1]
- gfs2: Do not cancel internal demote requests (Andreas Gruenbacher) [RHEL-135355]
- gfs2: run_queue cleanup (Andreas Gruenbacher) [RHEL-135355]
- gfs2: simplify finish_xmote (Andreas Gruenbacher) [RHEL-135355]
- gfs2: Get rid of unnecessary test_and_set_bit (Andreas Gruenbacher) [RHEL-135355]
- gfs2: Retries missing in gfs2_{rename,exchange} (Andreas Gruenbacher) [RHEL-135355]
- gfs2: glock cancelation flag fix (Andreas Gruenbacher) [RHEL-135355]
- gfs2: Minor do_xmote cancelation fix (Andreas Gruenbacher) [RHEL-135355]
- sctp: avoid NULL dereference when chunk data buffer is missing (CKI Backport Bot) [RHEL-133999] {CVE-2025-40240}
- redhat: introduce RELEASE_LOCALVERSION variable (Jan Stancek)
- cifs: fix automount with passwords that contain commas (Paulo Alcantara) [RHEL-125963]
- perf/x86/intel/ds: Fix the conversion from TSC to perf time (Anubhav Shelat) [RHEL-127171]
- perf/x86/intel/pebs: Fix PEBS timestamps overwritten (Anubhav Shelat) [RHEL-127171]
- ceph: fix client race condition where r_parent becomes stale before sending message (Alex Markuze) [RHEL-120226]
- ceph: fix client race condition validating r_parent before applying state (Alex Markuze) [RHEL-120226]
- blk-mq: setup queue ->tag_set before initializing hctx (Ming Lei) [RHEL-30744]
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (Ming Lei) [RHEL-30744]
- blk-mq: don't schedule block kworker on isolated CPUs (Ming Lei) [RHEL-30744]
- sched/isolation: add cpu_is_isolated() API (Ming Lei) [RHEL-30744]
[4.18.0-553.90.1]
- NFSv4: xattr handlers should check for absent nfs filehandles (Scott Mayhew) [RHEL-129945]
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
kernel-tools-libs-devel
4.18.0-553.92.1.el8_10
bpftool
4.18.0-553.92.1.el8_10
kernel-cross-headers
4.18.0-553.92.1.el8_10
kernel-headers
4.18.0-553.92.1.el8_10
kernel-tools
4.18.0-553.92.1.el8_10
kernel-tools-libs
4.18.0-553.92.1.el8_10
perf
4.18.0-553.92.1.el8_10
python3-perf
4.18.0-553.92.1.el8_10
Oracle Linux x86_64
kernel-tools-libs-devel
4.18.0-553.92.1.el8_10
bpftool
4.18.0-553.92.1.el8_10
kernel
4.18.0-553.92.1.el8_10
kernel-core
4.18.0-553.92.1.el8_10
kernel-cross-headers
4.18.0-553.92.1.el8_10
kernel-debug
4.18.0-553.92.1.el8_10
kernel-debug-core
4.18.0-553.92.1.el8_10
kernel-debug-devel
4.18.0-553.92.1.el8_10
kernel-debug-modules
4.18.0-553.92.1.el8_10
kernel-debug-modules-extra
4.18.0-553.92.1.el8_10
kernel-devel
4.18.0-553.92.1.el8_10
kernel-doc
4.18.0-553.92.1.el8_10
kernel-modules-extra
4.18.0-553.92.1.el8_10
kernel-tools
4.18.0-553.92.1.el8_10
kernel-tools-libs
4.18.0-553.92.1.el8_10
perf
4.18.0-553.92.1.el8_10
python3-perf
4.18.0-553.92.1.el8_10
kernel-abi-stablelists
4.18.0-553.92.1.el8_10
kernel-headers
4.18.0-553.92.1.el8_10
kernel-modules
4.18.0-553.92.1.el8_10
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as below: BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline] BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627 Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465 CPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433 kasan_report+0xb1/0x1e0 mm/kasan/report.c:495 __create_pipe include/linux/usb.h:1945 [inline] send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627 vfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991 vfs_write+0x2d7/0xdd0 fs/read_write.c:576 ksys_write+...
In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as below: BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline] BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627 Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465 CPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433 kasan_report+0xb1/0x1e0 mm/kasan/report.c:495 __create_pipe include/linux/usb.h:1945 [inline] send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627 vfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991 vfs_write+0x2d7/0xdd0 fs/read_write.c:576 ksys_write
In the Linux kernel, the following vulnerability has been resolved: m ...