Описание
ELSA-2026-50133: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.15.0-317.197.5.2]
- xfrm: flush all states in xfrm_state_fini (Sabrina Dubroca) [Orabug: 39016261]
- xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added (Sabrina Dubroca) [Orabug: 39016261]
- Revert 'xfrm: destroy xfrm_state synchronously on net exit path' (Sabrina Dubroca) [Orabug: 39016261]
- tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). (Kuniyuki Iwashima) [Orabug: 39016219] {CVE-2025-40149}
- net: Add locking to protect skb->dev access in ip_output (Sharath Chandra Vurukala) [Orabug: 39016219]
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bpftool
5.15.0-317.197.5.2.el8uek
kernel-uek
5.15.0-317.197.5.2.el8uek
kernel-uek-container
5.15.0-317.197.5.2.el8uek
kernel-uek-container-debug
5.15.0-317.197.5.2.el8uek
kernel-uek-core
5.15.0-317.197.5.2.el8uek
kernel-uek-debug
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-core
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-devel
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-modules
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-modules-extra
5.15.0-317.197.5.2.el8uek
kernel-uek-devel
5.15.0-317.197.5.2.el8uek
kernel-uek-doc
5.15.0-317.197.5.2.el8uek
kernel-uek-modules
5.15.0-317.197.5.2.el8uek
kernel-uek-modules-extra
5.15.0-317.197.5.2.el8uek
Oracle Linux x86_64
bpftool
5.15.0-317.197.5.2.el8uek
kernel-uek
5.15.0-317.197.5.2.el8uek
kernel-uek-container
5.15.0-317.197.5.2.el8uek
kernel-uek-container-debug
5.15.0-317.197.5.2.el8uek
kernel-uek-core
5.15.0-317.197.5.2.el8uek
kernel-uek-debug
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-core
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-devel
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-modules
5.15.0-317.197.5.2.el8uek
kernel-uek-debug-modules-extra
5.15.0-317.197.5.2.el8uek
kernel-uek-devel
5.15.0-317.197.5.2.el8uek
kernel-uek-doc
5.15.0-317.197.5.2.el8uek
kernel-uek-modules
5.15.0-317.197.5.2.el8uek
kernel-uek-modules-extra
5.15.0-317.197.5.2.el8uek
Oracle Linux 9
Oracle Linux aarch64
bpftool
5.15.0-317.197.5.2.el9uek
kernel-uek
5.15.0-317.197.5.2.el9uek
kernel-uek-container
5.15.0-317.197.5.2.el9uek
kernel-uek-container-debug
5.15.0-317.197.5.2.el9uek
kernel-uek-core
5.15.0-317.197.5.2.el9uek
kernel-uek-debug
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-core
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-devel
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-modules
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-modules-extra
5.15.0-317.197.5.2.el9uek
kernel-uek-devel
5.15.0-317.197.5.2.el9uek
kernel-uek-doc
5.15.0-317.197.5.2.el9uek
kernel-uek-modules
5.15.0-317.197.5.2.el9uek
kernel-uek-modules-extra
5.15.0-317.197.5.2.el9uek
kernel-uek64k
5.15.0-317.197.5.2.el9uek
kernel-uek64k-core
5.15.0-317.197.5.2.el9uek
kernel-uek64k-devel
5.15.0-317.197.5.2.el9uek
kernel-uek64k-modules
5.15.0-317.197.5.2.el9uek
kernel-uek64k-modules-extra
5.15.0-317.197.5.2.el9uek
Oracle Linux x86_64
bpftool
5.15.0-317.197.5.2.el9uek
kernel-uek
5.15.0-317.197.5.2.el9uek
kernel-uek-container
5.15.0-317.197.5.2.el9uek
kernel-uek-container-debug
5.15.0-317.197.5.2.el9uek
kernel-uek-core
5.15.0-317.197.5.2.el9uek
kernel-uek-debug
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-core
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-devel
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-modules
5.15.0-317.197.5.2.el9uek
kernel-uek-debug-modules-extra
5.15.0-317.197.5.2.el9uek
kernel-uek-devel
5.15.0-317.197.5.2.el9uek
kernel-uek-doc
5.15.0-317.197.5.2.el9uek
kernel-uek-modules
5.15.0-317.197.5.2.el9uek
kernel-uek-modules-extra
5.15.0-317.197.5.2.el9uek
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In commit b441cf3f8c4b ("xfrm: delete x->tunnel as we delete x"), I missed the case where state creation fails between full initialization (->init_state has been called) and being inserted on the lists. In this situation, ->init_state has been called, so for IPcomp tunnels, the fallback tunnel has been created and added onto the lists, but the user state never gets added, because we fail before that. The user state doesn't go through __xfrm_state_delete, so we don't call xfrm_state_delete_tunnel for those states, and we end up leaking the FB tunnel. There are several codepaths affected by this: the add/update paths, in both net/key and xfrm, and the migrate code (xfrm_migrate, xfrm_state_migrate). A "proper" rollback of the init_state work would probably be doable in the add/update code, but for migrate it gets more complicated...
In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In commit b441cf3f8c4b ("xfrm: delete x->tunnel as we delete x"), I missed the case where state creation fails between full initialization (->init_state has been called) and being inserted on the lists. In this situation, ->init_state has been called, so for IPcomp tunnels, the fallback tunnel has been created and added onto the lists, but the user state never gets added, because we fail before that. The user state doesn't go through __xfrm_state_delete, so we don't call xfrm_state_delete_tunnel for those states, and we end up leaking the FB tunnel. There are several codepaths affected by this: the add/update paths, in both net/key and xfrm, and the migrate code (xfrm_migrate, xfrm_state_migrate). A "proper" rollback of the init_state work would probably be doable in the add/update code, but for migrate it gets more complicated...
In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added In commit b441cf3f8c4b ("xfrm: delete x->tunnel as we delete x"), I missed the case where state creation fails between full initialization (->init_state has been called) and being inserted on the lists. In this situation, ->init_state has been called, so for IPcomp tunnels, the fallback tunnel has been created and added onto the lists, but the user state never gets added, because we fail before that. The user state doesn't go through __xfrm_state_delete, so we don't call xfrm_state_delete_tunnel for those states, and we end up leaking the FB tunnel. There are several codepaths affected by this: the add/update paths, in both net/key and xfrm, and the migrate code (xfrm_migrate, xfrm_state_migrate). A "proper" rollback of the init_state work would probably be doable in the add/update code, but for migrate it gets more complicate
In the Linux kernel, the following vulnerability has been resolved: x ...
In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). get_netdev_for_sock() is called during setsockopt(), so not under RCU. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the only ->ndo_sk_get_lower_dev() user is bond_sk_get_lower_dev(), which uses RCU.