Oracle alert ELSA-2025-13962 (kernel)
| From: | Errata Announcements for Oracle Linux via El-errata <el-errata@oss.oracle.com> | |
| To: | el-errata@oss.oracle.com | |
| Subject: | [El-errata] ELSA-2025-13962 Important: Oracle Linux 9 kernel security update | |
| Date: | Thu, 21 Aug 2025 06:08:05 -0700 | |
| Message-ID: | <mailman.28.1755781715.253.el-errata@oss.oracle.com> |
Oracle Linux Security Advisory ELSA-2025-13962 http://linux.oracle.com/errata/ELSA-2025-13962.html The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network: x86_64: kernel-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-abi-stablelists-5.14.0-570.35.1.0.1.el9_6.noarch.rpm kernel-core-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-cross-headers-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-core-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-devel-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-devel-matched-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-modules-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-modules-core-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-modules-extra-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-debug-uki-virt-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-devel-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-devel-matched-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-doc-5.14.0-570.35.1.0.1.el9_6.noarch.rpm kernel-headers-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-modules-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-modules-core-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-modules-extra-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-tools-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-tools-libs-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-tools-libs-devel-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-uki-virt-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm kernel-uki-virt-addons-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm libperf-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm perf-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm python3-perf-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm rtla-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm rv-5.14.0-570.35.1.0.1.el9_6.x86_64.rpm aarch64: kernel-cross-headers-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm kernel-headers-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm kernel-tools-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm kernel-tools-libs-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm kernel-tools-libs-devel-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm perf-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm python3-perf-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm rtla-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm rv-5.14.0-570.35.1.0.1.el9_6.aarch64.rpm SRPMS: http://oss.oracle.com/ol9/SRPMS-updates/kernel-5.14.0-570... Related CVEs: CVE-2024-28956 CVE-2025-21867 CVE-2025-38084 CVE-2025-38085 CVE-2025-38124 CVE-2025-38159 CVE-2025-38250 CVE-2025-38380 CVE-2025-38471 Description of changes: [5.14.0-570.35.1.0.1.el9_6.OL9] - nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650] - Disable UKI signing [Orabug: 36571828] - Update Oracle Linux certificates (Kevin Lyons) - Disable signing for aarch64 (Ilya Okomin) - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5] - Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535] - Add Oracle Linux IMA certificates - Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764] [5.14.0-570.35.1.el9_6] - s390/dasd: Remove DMA alignment (CKI Backport Bot) [RHEL-91593] - s390/cpumf: Update CPU Measurement facility extended counter set support (CKI Backport Bot) [RHEL-103066] - s390/topology: Improve topology detection (CKI Backport Bot) [RHEL-92100] - s390/pai: export number of sysfs attribute files (CKI Backport Bot) [RHEL-87178] - s390/pai: fix attr_event_free upper limit for pai device drivers (CKI Backport Bot) [RHEL-87178] - powerpc/64s/radix/kfence: map __kfence_pool at page granularity (Mamatha Inamdar) [RHEL-92081] - wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CKI Backport Bot) [RHEL-103151] {CVE-2025-38159} - redhat: Mark kernel incompatible with xdp-tools<1.5.4 (Felix Maurer) [RHEL-101008] - bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (CKI Backport Bot) [RHEL-101008] {CVE-2025-21867} - arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (Waiman Long) [RHEL-100603] - arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (Waiman Long) [RHEL-100603] {CVE-2025-37963} - arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (Waiman Long) [RHEL-100603] {CVE-2025-37948} - arm64: proton-pack: Expose whether the branchy loop k value (Waiman Long) [RHEL-100603] - arm64: proton-pack: Expose whether the platform is mitigated by firmware (Waiman Long) [RHEL-100603] - arm64: insn: Add support for encoding DSB (Waiman Long) [RHEL-100603] - redhat/configs: Enable CONFIG_MITIGATION_ITS for x86 (Waiman Long) [RHEL-100603] - selftest/x86/bugs: Add selftests for ITS (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/ibt: Keep IBT disabled during alternative patching (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Align RETs in BHB clear sequence to avoid thunking (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Add support for RSB stuffing mitigation (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Add "vmexit" option to skip mitigation on some CPUs (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Enable Indirect Target Selection mitigation (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Add support for ITS-safe return thunk (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Add support for ITS-safe indirect thunk (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/its: Enumerate Indirect Target Selection (ITS) bug (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - Documentation: x86/bugs/its: Add ITS documentation (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956} - x86/bhi: Do not set BHI_DIS_S in 32-bit mode (Waiman Long) [RHEL-100603] - x86/bpf: Add IBHF call at end of classic BPF (Waiman Long) [RHEL-100603] - x86/bpf: Call branch history clearing sequence on exit (Waiman Long) [RHEL-100603] - arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHB (Waiman Long) [RHEL-100603] - arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (Waiman Long) [RHEL-100603] - x86/rfds: Exclude P-only parts from the RFDS affected list (Waiman Long) [RHEL-100603] - x86/cpu: Update x86_match_cpu() to also use cpu-type (Waiman Long) [RHEL-100603] - x86/cpu: Add cpu_type to struct x86_cpu_id (Waiman Long) [RHEL-100603] - x86/cpu: Shorten CPU matching macro (Waiman Long) [RHEL-100603] - x86/cpu: Fix the description of X86_MATCH_VFM_STEPS() (Waiman Long) [RHEL-100603] - selftests: Warn about skipped tests in result summary (Waiman Long) [RHEL-100603] - x86/cpu: Fix typo in x86_match_cpu()'s doc (Waiman Long) [RHEL-100603] - x86/cpu: Expose only stepping min/max interface (Waiman Long) [RHEL-100603] - x86/cpu: Add CPU type to struct cpuinfo_topology (Waiman Long) [RHEL-100603] - x86/cpufeatures: Add X86_FEATURE_AMD_HETEROGENEOUS_CORES (Waiman Long) [RHEL-100603] - x86/cpufeatures: Rename X86_FEATURE_FAST_CPPC to have AMD prefix (Waiman Long) [RHEL-100603] - tools/include: Sync x86 headers with the kernel sources (Waiman Long) [RHEL-100603] - selftests: ksft: Fix finished() helper exit code on skipped tests (Waiman Long) [RHEL-100603] - kselftest: Move ksft helper module to common directory (Waiman Long) [RHEL-100603] - platform/x86/intel/ifs: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - x86/platform/atom: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - cpufreq: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - x86/bugs: Add 'spectre_bhi=vmexit' cmdline option (Waiman Long) [RHEL-100603] - EDAC/skx: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - EDAC/i10nm: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - x86/cpu: Fix x86_match_cpu() to match just X86_VENDOR_INTEL (Waiman Long) [RHEL-100603] - x86/aperfmperf: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - x86/apic: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - x86/bugs: Switch to new Intel CPU model defines (Waiman Long) [RHEL-100603] - EDAC/i10nm: Add Intel Grand Ridge micro-server support (Waiman Long) [RHEL-100603] - Revert "sch_htb: make htb_qlen_notify() idempotent" (Patrick Talbert) [RHEL-108138] - Revert "sch_drr: make drr_qlen_notify() idempotent" (Patrick Talbert) [RHEL-108138] - Revert "sch_qfq: make qfq_qlen_notify() idempotent" (Patrick Talbert) [RHEL-108138] - Revert "codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()" (Patrick Talbert) [RHEL-108138] - Revert "sch_htb: make htb_deactivate() idempotent" (Patrick Talbert) [RHEL-108138] - Revert "net/sched: Always pass notifications when child class becomes empty" (Patrick Talbert) [RHEL-108138] [5.14.0-570.34.1.el9_6] - i2c/designware: Fix an initialization issue (CKI Backport Bot) [RHEL-106625] {CVE-2025-38380} - tls: always refresh the queue when reading sock (CKI Backport Bot) [RHEL-106081] {CVE-2025-38471} - net: fix udp gso skb_segment after pull from frag_list (Guillaume Nault) [RHEL-103028] {CVE-2025-38124} - mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (Rafael Aquini) [RHEL-101246] {CVE-2025-38085} - mm/hugetlb: unshare page tables during VMA split, not before (Rafael Aquini) [RHEL-101282] {CVE-2025-38084} - mm: fix copy_vma() error handling for hugetlb mappings (Rafael Aquini) [RHEL-101282] - Bluetooth: hci_core: Fix use-after-free in vhci_flush() (CKI Backport Bot) [RHEL-103256] {CVE-2025-38250} _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata
