Описание
ELSA-2026-3066: kernel security update (MODERATE)
[5.14.0-611.35.1]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]
[5.14.0-611.35.1]
- page_pool: Fix use-after-free in page_pool_recycle_in_ring (Paolo Abeni) [RHEL-137841] {CVE-2025-38129}
- exfat: fix double free in delayed_free (CKI Backport Bot) [RHEL-146403] {CVE-2025-38206}
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
kernel-cross-headers
5.14.0-611.35.1.el9_7
kernel-tools-libs-devel
5.14.0-611.35.1.el9_7
libperf
5.14.0-611.35.1.el9_7
kernel-headers
5.14.0-611.35.1.el9_7
perf
5.14.0-611.35.1.el9_7
python3-perf
5.14.0-611.35.1.el9_7
rtla
5.14.0-611.35.1.el9_7
rv
5.14.0-611.35.1.el9_7
kernel-tools
5.14.0-611.35.1.el9_7
kernel-tools-libs
5.14.0-611.35.1.el9_7
Oracle Linux x86_64
kernel-debug-devel
5.14.0-611.35.1.el9_7
kernel-debug-devel-matched
5.14.0-611.35.1.el9_7
kernel-devel
5.14.0-611.35.1.el9_7
kernel-devel-matched
5.14.0-611.35.1.el9_7
kernel-doc
5.14.0-611.35.1.el9_7
kernel-headers
5.14.0-611.35.1.el9_7
perf
5.14.0-611.35.1.el9_7
python3-perf
5.14.0-611.35.1.el9_7
rtla
5.14.0-611.35.1.el9_7
rv
5.14.0-611.35.1.el9_7
kernel-cross-headers
5.14.0-611.35.1.el9_7
kernel-tools-libs-devel
5.14.0-611.35.1.el9_7
libperf
5.14.0-611.35.1.el9_7
kernel
5.14.0-611.35.1.el9_7
kernel-abi-stablelists
5.14.0-611.35.1.el9_7
kernel-core
5.14.0-611.35.1.el9_7
kernel-debug
5.14.0-611.35.1.el9_7
kernel-debug-core
5.14.0-611.35.1.el9_7
kernel-debug-modules
5.14.0-611.35.1.el9_7
kernel-debug-modules-core
5.14.0-611.35.1.el9_7
kernel-debug-modules-extra
5.14.0-611.35.1.el9_7
kernel-debug-uki-virt
5.14.0-611.35.1.el9_7
kernel-modules
5.14.0-611.35.1.el9_7
kernel-modules-core
5.14.0-611.35.1.el9_7
kernel-modules-extra
5.14.0-611.35.1.el9_7
kernel-tools
5.14.0-611.35.1.el9_7
kernel-tools-libs
5.14.0-611.35.1.el9_7
kernel-uki-virt
5.14.0-611.35.1.el9_7
kernel-uki-virt-addons
5.14.0-611.35.1.el9_7
Связанные CVE
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396...
In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396...
In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spi
In the Linux kernel, the following vulnerability has been resolved: p ...