Oracle Linux 9:内核 (ELSA-2025-13962)

medium Nessus 插件 ID 252958

简介

远程 Oracle Linux 主机缺少一个或多个安全更新。

描述

远程 Oracle Linux 9 主机上安装的程序包受到 ELSA-2025-13962 公告中提及的多个漏洞影响。

- wifi:rtw88:修复“para”缓冲区大小以避免读取越界 (CKI Backport Bot) [RHEL-103151] {CVE-2025-38159}
- bpftest_run修复 eth_skb_pkt_type() 中的释放后使用问题 (CKI Backport Bot) [RHEL-101008] {CVE-2025-21867}
- arm64bpf仅缓解非特权用户加载的 cBPF 程序 (Waiman Long) [RHEL-100603] {CVE-2025-37963}
- arm64: bpf将 BHB 缓解措施添加到 cBPF 程序的尾声 (Waiman Long) [RHEL-100603] {CVE-2025-37948}
- selftest/x86/bugs为 ITS 添加 selftest (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/ibt其他修补程序期间保持 IBT 禁用状态 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its对齐 BHB 清除序列中的 RET 以避免thunking (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its添加对 RSB 填充缓解措施的支持 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its添加“vmexit”选项以跳过某些 CPU 上的缓解措施 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its启用间接目标选择缓解措施 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its添加对 ITS 安全的返回 thunk 的支持 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its添加对 ITS 安全的间接 thunk 的支持 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- x86/its枚举间接目标选择 (ITS) 缺陷 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- 文档x86/bugs/its添加 ITS 文档 (Waiman Long) [RHEL-100603 RHEL-92182] {CVE-2024-28956}
- i2c/designware修复初始化问题 (CKI Backport Bot) [RHEL-106625] {CVE-2025-38380}
- tls读取 sock 时始终刷新队列 (CKI Backport Bot) [RHEL-106081] {CVE-2025-38471}
- net修复从 frag_list 拉取之后的 udp gso skb_segment (Guillaume Nault) [RHEL-103028] {CVE-2025-38124}
- mm/hugetlb:修复 huge_pmd_unshare() 与 GUP-fast 争用 (Rafael Aquini) [RHEL-101246] {CVE-2025-38085}
- mm/hugetlb在 VMA 拆分期间取消共享页面表而非之前 (Rafael Aquini) [RHEL-101282] {CVE-2025-38084}

Tenable 已直接从 Oracle Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://linux.oracle.com/errata/ELSA-2025-13962.html

插件详情

严重性: Medium

ID: 252958

文件名: oraclelinux_ELSA-2025-13962.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2025/8/20

最近更新时间: 2025/8/20

支持的传感器: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: High

基本分数: 7.3

时间分数: 5.4

矢量: CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:C

CVSS 分数来源: CVE-2025-38471

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 6.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

CVSS 分数来源: CVE-2025-21867

CVSS v4

风险因素: Medium

Base Score: 5.7

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS 分数来源: CVE-2024-28956

漏洞信息

CPE: p-cpe:/a:oracle:linux:kernel-tools-libs-devel, p-cpe:/a:oracle:linux:rtla, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel-cross-headers, p-cpe:/a:oracle:linux:kernel-debug-modules, p-cpe:/a:oracle:linux:kernel-tools, p-cpe:/a:oracle:linux:rv, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:kernel-headers, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-debug-uki-virt, p-cpe:/a:oracle:linux:kernel-debug-modules-core, p-cpe:/a:oracle:linux:kernel-modules, p-cpe:/a:oracle:linux:kernel-debug-devel-matched, p-cpe:/a:oracle:linux:kernel-abi-stablelists, p-cpe:/a:oracle:linux:kernel-devel-matched, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-modules-core, p-cpe:/a:oracle:linux:kernel-core, p-cpe:/a:oracle:linux:kernel-uki-virt, p-cpe:/a:oracle:linux:libperf, p-cpe:/a:oracle:linux:kernel-debug-modules-extra, p-cpe:/a:oracle:linux:python3-perf, p-cpe:/a:oracle:linux:kernel-debug-core, p-cpe:/a:oracle:linux:kernel-uki-virt-addons, cpe:/o:oracle:linux:9:6:baseos_patch, p-cpe:/a:oracle:linux:perf, p-cpe:/a:oracle:linux:kernel-modules-extra, p-cpe:/a:oracle:linux:kernel-tools-libs, p-cpe:/a:oracle:linux:kernel

必需的 KB 项: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

易利用性: No known exploits are available

补丁发布日期: 2025/8/19

漏洞发布日期: 2025/3/26

参考资料信息

CVE: CVE-2024-28956, CVE-2025-21867, CVE-2025-38084, CVE-2025-38085, CVE-2025-38124, CVE-2025-38159, CVE-2025-38250, CVE-2025-38380, CVE-2025-38471