Описание
ELSA-2026-1617: kernel security update (MODERATE)
[5.14.0-611.27.1]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-611.27.1]
- net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (CKI Backport Bot) [RHEL-136822] {CVE-2025-38568}
- devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (CKI Backport Bot) [RHEL-134923] {CVE-2025-40251}
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CKI Backport Bot) [RHEL-129112] {CVE-2025-40154}
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-611.27.1.el9_7
kernel-tools-libs-devel
5.14.0-611.27.1.el9_7
libperf
5.14.0-611.27.1.el9_7
kernel-tools
5.14.0-611.27.1.el9_7
kernel-tools-libs
5.14.0-611.27.1.el9_7
kernel-headers
5.14.0-611.27.1.el9_7
perf
5.14.0-611.27.1.el9_7
python3-perf
5.14.0-611.27.1.el9_7
rtla
5.14.0-611.27.1.el9_7
rv
5.14.0-611.27.1.el9_7
Oracle Linux x86_64
kernel-debug-devel
5.14.0-611.27.1.el9_7
kernel-debug-devel-matched
5.14.0-611.27.1.el9_7
kernel-devel
5.14.0-611.27.1.el9_7
kernel-devel-matched
5.14.0-611.27.1.el9_7
kernel-doc
5.14.0-611.27.1.el9_7
kernel-headers
5.14.0-611.27.1.el9_7
perf
5.14.0-611.27.1.el9_7
python3-perf
5.14.0-611.27.1.el9_7
rtla
5.14.0-611.27.1.el9_7
rv
5.14.0-611.27.1.el9_7
kernel-cross-headers
5.14.0-611.27.1.el9_7
kernel-tools-libs-devel
5.14.0-611.27.1.el9_7
libperf
5.14.0-611.27.1.el9_7
kernel
5.14.0-611.27.1.el9_7
kernel-abi-stablelists
5.14.0-611.27.1.el9_7
kernel-core
5.14.0-611.27.1.el9_7
kernel-debug
5.14.0-611.27.1.el9_7
kernel-debug-core
5.14.0-611.27.1.el9_7
kernel-debug-modules
5.14.0-611.27.1.el9_7
kernel-debug-modules-core
5.14.0-611.27.1.el9_7
kernel-debug-modules-extra
5.14.0-611.27.1.el9_7
kernel-debug-uki-virt
5.14.0-611.27.1.el9_7
kernel-modules
5.14.0-611.27.1.el9_7
kernel-modules-core
5.14.0-611.27.1.el9_7
kernel-modules-extra
5.14.0-611.27.1.el9_7
kernel-tools
5.14.0-611.27.1.el9_7
kernel-tools-libs
5.14.0-611.27.1.el9_7
kernel-uki-virt
5.14.0-611.27.1.el9_7
kernel-uki-virt-addons
5.14.0-611.27.1.el9_7
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing