Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-1617

Опубликовано: 02 фев. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-1617: kernel security update (MODERATE)

[5.14.0-611.27.1]

  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-611.27.1]

  • net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (CKI Backport Bot) [RHEL-136822] {CVE-2025-38568}
  • devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (CKI Backport Bot) [RHEL-134923] {CVE-2025-40251}
  • ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CKI Backport Bot) [RHEL-129112] {CVE-2025-40154}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-611.27.1.el9_7

kernel-tools-libs-devel

5.14.0-611.27.1.el9_7

libperf

5.14.0-611.27.1.el9_7

kernel-tools

5.14.0-611.27.1.el9_7

kernel-tools-libs

5.14.0-611.27.1.el9_7

kernel-headers

5.14.0-611.27.1.el9_7

perf

5.14.0-611.27.1.el9_7

python3-perf

5.14.0-611.27.1.el9_7

rtla

5.14.0-611.27.1.el9_7

rv

5.14.0-611.27.1.el9_7

Oracle Linux x86_64

kernel-debug-devel

5.14.0-611.27.1.el9_7

kernel-debug-devel-matched

5.14.0-611.27.1.el9_7

kernel-devel

5.14.0-611.27.1.el9_7

kernel-devel-matched

5.14.0-611.27.1.el9_7

kernel-doc

5.14.0-611.27.1.el9_7

kernel-headers

5.14.0-611.27.1.el9_7

perf

5.14.0-611.27.1.el9_7

python3-perf

5.14.0-611.27.1.el9_7

rtla

5.14.0-611.27.1.el9_7

rv

5.14.0-611.27.1.el9_7

kernel-cross-headers

5.14.0-611.27.1.el9_7

kernel-tools-libs-devel

5.14.0-611.27.1.el9_7

libperf

5.14.0-611.27.1.el9_7

kernel

5.14.0-611.27.1.el9_7

kernel-abi-stablelists

5.14.0-611.27.1.el9_7

kernel-core

5.14.0-611.27.1.el9_7

kernel-debug

5.14.0-611.27.1.el9_7

kernel-debug-core

5.14.0-611.27.1.el9_7

kernel-debug-modules

5.14.0-611.27.1.el9_7

kernel-debug-modules-core

5.14.0-611.27.1.el9_7

kernel-debug-modules-extra

5.14.0-611.27.1.el9_7

kernel-debug-uki-virt

5.14.0-611.27.1.el9_7

kernel-modules

5.14.0-611.27.1.el9_7

kernel-modules-core

5.14.0-611.27.1.el9_7

kernel-modules-extra

5.14.0-611.27.1.el9_7

kernel-tools

5.14.0-611.27.1.el9_7

kernel-tools-libs

5.14.0-611.27.1.el9_7

kernel-uki-virt

5.14.0-611.27.1.el9_7

kernel-uki-virt-addons

5.14.0-611.27.1.el9_7

Связанные уязвимости

oracle-oval
7 дней назад

ELSA-2026-1690: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.

CVSS3: 4.7
redhat
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.

CVSS3: 7.8
nvd
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.

CVSS3: 7.8
msrc
5 месяцев назад

net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing