Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-3066

Опубликовано: 24 фев. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-3066: kernel security update (MODERATE)

[5.14.0-611.35.1]

  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-611.35.1]

  • page_pool: Fix use-after-free in page_pool_recycle_in_ring (Paolo Abeni) [RHEL-137841] {CVE-2025-38129}
  • exfat: fix double free in delayed_free (CKI Backport Bot) [RHEL-146403] {CVE-2025-38206}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

kernel-cross-headers

5.14.0-611.35.1.el9_7

kernel-tools-libs-devel

5.14.0-611.35.1.el9_7

libperf

5.14.0-611.35.1.el9_7

kernel-headers

5.14.0-611.35.1.el9_7

perf

5.14.0-611.35.1.el9_7

python3-perf

5.14.0-611.35.1.el9_7

rtla

5.14.0-611.35.1.el9_7

rv

5.14.0-611.35.1.el9_7

kernel-tools

5.14.0-611.35.1.el9_7

kernel-tools-libs

5.14.0-611.35.1.el9_7

Oracle Linux x86_64

kernel-debug-devel

5.14.0-611.35.1.el9_7

kernel-debug-devel-matched

5.14.0-611.35.1.el9_7

kernel-devel

5.14.0-611.35.1.el9_7

kernel-devel-matched

5.14.0-611.35.1.el9_7

kernel-doc

5.14.0-611.35.1.el9_7

kernel-headers

5.14.0-611.35.1.el9_7

perf

5.14.0-611.35.1.el9_7

python3-perf

5.14.0-611.35.1.el9_7

rtla

5.14.0-611.35.1.el9_7

rv

5.14.0-611.35.1.el9_7

kernel-cross-headers

5.14.0-611.35.1.el9_7

kernel-tools-libs-devel

5.14.0-611.35.1.el9_7

libperf

5.14.0-611.35.1.el9_7

kernel

5.14.0-611.35.1.el9_7

kernel-abi-stablelists

5.14.0-611.35.1.el9_7

kernel-core

5.14.0-611.35.1.el9_7

kernel-debug

5.14.0-611.35.1.el9_7

kernel-debug-core

5.14.0-611.35.1.el9_7

kernel-debug-modules

5.14.0-611.35.1.el9_7

kernel-debug-modules-core

5.14.0-611.35.1.el9_7

kernel-debug-modules-extra

5.14.0-611.35.1.el9_7

kernel-debug-uki-virt

5.14.0-611.35.1.el9_7

kernel-modules

5.14.0-611.35.1.el9_7

kernel-modules-core

5.14.0-611.35.1.el9_7

kernel-modules-extra

5.14.0-611.35.1.el9_7

kernel-tools

5.14.0-611.35.1.el9_7

kernel-tools-libs

5.14.0-611.35.1.el9_7

kernel-uki-virt

5.14.0-611.35.1.el9_7

kernel-uki-virt-addons

5.14.0-611.35.1.el9_7

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396...

CVSS3: 7.3
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396...

CVSS3: 7.8
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spi

msrc
4 месяца назад

page_pool: Fix use-after-free in page_pool_recycle_in_ring

CVSS3: 7.8
debian
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...