Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-4012

Опубликовано: 10 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2026-4012: kernel security update (IMPORTANT)

[6.12.0-124.43.1]

  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985782]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Update module name for cryptographic module [Orabug: 37400433]
  • Clean git history at setup stage

[6.12.0-124.43.1]

  • HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save (CKI Backport Bot) [RHEL-142253] {CVE-2025-39818}
  • drm/xe: Make dma-fences compliant with the safe access rules (Mika Penttila) [RHEL-122272] {CVE-2025-38703}

[6.12.0-124.42.1]

  • dpll: zl3073x: Fix ref frequency setting (Ivan Vecera) [RHEL-139828]
  • dpll: Prevent duplicate registrations (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Remove unused dev wrappers (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Cache all output properties in zl3073x_out (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Cache all reference properties in zl3073x_ref (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Cache reference monitor status (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Split ref, out, and synth logic from core (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Store raw register values instead of parsed state (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: fix kernel-doc name and missing parameter in fw.c (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Specify phase adjustment granularity for pins (Ivan Vecera) [RHEL-139828]
  • dpll: add phase-adjust-gran pin attribute (Ivan Vecera) [RHEL-139828]
  • dpll: fix device-id-get and pin-id-get to return errors properly (Ivan Vecera) [RHEL-139828]
  • dpll: spec: add missing module-name and clock-id to pin-get reply (Ivan Vecera) [RHEL-139828]
  • dpll: zl3073x: Allow to configure phase offset averaging factor (Ivan Vecera) [RHEL-139828]
  • dpll: add phase_offset_avg_factor_get/set callback ops (Ivan Vecera) [RHEL-139828]
  • dpll: add phase-offset-avg-factor device attribute to netlink spec (Ivan Vecera) [RHEL-139828]
  • dpll: fix clock quality level reporting (Ivan Vecera) [RHEL-139828]
  • dpll: add reference sync get/set (Ivan Vecera) [RHEL-139828]
  • dpll: add reference-sync netlink attribute (Ivan Vecera) [RHEL-139828]
  • dpll: remove documentation of rclk_dev_name (Ivan Vecera) [RHEL-139828]
  • ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (CKI Backport Bot) [RHEL-143548] {CVE-2025-71085}
  • usb: core: config: Prevent OOB read in SS endpoint companion parsing (CKI Backport Bot) [RHEL-137370] {CVE-2025-39760}
  • sched_ext: Fix scx_kick_pseqs corruption on concurrent scheduler loads (Phil Auld) [RHEL-124637]
  • sched_ext: Allocate scx_kick_cpus_pnt_seqs lazily using kvzalloc() (Phil Auld) [RHEL-124637]

[6.12.0-124.41.1]

  • vfs: check dentry is still valid in get_link() (Ian Kent) [RHEL-134853]
  • efivarfs: fix error propagation in efivar_entry_get() (CKI Backport Bot) [RHEL-150116] {CVE-2026-23156}
  • KVM: x86: Apply runtime updates to current CPUID during KVM_SET_CPUID{,2} (Igor Mammedov) [RHEL-148458]
  • printk: Use console_is_usable on console_unblank (CKI Backport Bot) [RHEL-148303]
  • printk: Avoid irq_work for printk_deferred() on suspend (CKI Backport Bot) [RHEL-148303]
  • printk: Avoid scheduling irq_work on suspend (CKI Backport Bot) [RHEL-148303]
  • printk: Allow printk_trigger_flush() to flush all types (CKI Backport Bot) [RHEL-148303]
  • printk: Check CON_SUSPEND when unblanking a console (CKI Backport Bot) [RHEL-148303]
  • printk: nbcon: Allow reacquire during panic (CKI Backport Bot) [RHEL-148303]
  • migrate: correct lock ordering for hugetlb file folios (Luiz Capitulino) [RHEL-147270] {CVE-2026-23097}
  • io_uring/sqpoll: don't put task_struct on tctx setup failure (Jeff Moyer) [RHEL-137992]
  • io_uring: consistently use rcu semantics with sqpoll thread (Jeff Moyer) [RHEL-137992]
  • io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() (Jeff Moyer) [RHEL-137992] {CVE-2025-38106}
  • io_uring/sqpoll: fix sqpoll error handling races (Jeff Moyer) [RHEL-137992]
  • gpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify() (CKI Backport Bot) [RHEL-145597] {CVE-2025-40249}
  • gpio: cdev: make sure the cdev fd is still active before emitting events (CKI Backport Bot) [RHEL-145597] {CVE-2025-40249}
  • macvlan: fix possible UAF in macvlan_forward_source() (CKI Backport Bot) [RHEL-144128] {CVE-2026-23001}
  • dm: use READ_ONCE in dm_blk_report_zones (Benjamin Marzinski) [RHEL-137953]
  • dm: fix unlocked test for dm_suspended_md (Benjamin Marzinski) [RHEL-137953]
  • dm: fix dm_blk_report_zones (CKI Backport Bot) [RHEL-137953] {CVE-2025-38141}

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

kernel-cross-headers

6.12.0-124.43.1.el10_1

kernel-headers

6.12.0-124.43.1.el10_1

kernel-tools

6.12.0-124.43.1.el10_1

kernel-tools-libs

6.12.0-124.43.1.el10_1

kernel-tools-libs-devel

6.12.0-124.43.1.el10_1

libperf

6.12.0-124.43.1.el10_1

perf

6.12.0-124.43.1.el10_1

python3-perf

6.12.0-124.43.1.el10_1

rtla

6.12.0-124.43.1.el10_1

rv

6.12.0-124.43.1.el10_1

Oracle Linux x86_64

kernel

6.12.0-124.43.1.el10_1

kernel-abi-stablelists

6.12.0-124.43.1.el10_1

kernel-core

6.12.0-124.43.1.el10_1

kernel-cross-headers

6.12.0-124.43.1.el10_1

kernel-debug

6.12.0-124.43.1.el10_1

kernel-debug-core

6.12.0-124.43.1.el10_1

kernel-debug-devel

6.12.0-124.43.1.el10_1

kernel-debug-devel-matched

6.12.0-124.43.1.el10_1

kernel-debug-modules

6.12.0-124.43.1.el10_1

kernel-debug-modules-core

6.12.0-124.43.1.el10_1

kernel-debug-modules-extra

6.12.0-124.43.1.el10_1

kernel-debug-uki-virt

6.12.0-124.43.1.el10_1

kernel-devel

6.12.0-124.43.1.el10_1

kernel-devel-matched

6.12.0-124.43.1.el10_1

kernel-doc

6.12.0-124.43.1.el10_1

kernel-headers

6.12.0-124.43.1.el10_1

kernel-modules

6.12.0-124.43.1.el10_1

kernel-modules-core

6.12.0-124.43.1.el10_1

kernel-modules-extra

6.12.0-124.43.1.el10_1

kernel-modules-extra-matched

6.12.0-124.43.1.el10_1

kernel-tools

6.12.0-124.43.1.el10_1

kernel-tools-libs

6.12.0-124.43.1.el10_1

kernel-tools-libs-devel

6.12.0-124.43.1.el10_1

kernel-uki-virt

6.12.0-124.43.1.el10_1

kernel-uki-virt-addons

6.12.0-124.43.1.el10_1

libperf

6.12.0-124.43.1.el10_1

perf

6.12.0-124.43.1.el10_1

python3-perf

6.12.0-124.43.1.el10_1

rtla

6.12.0-124.43.1.el10_1

rv

6.12.0-124.43.1.el10_1

Связанные уязвимости

oracle-oval
16 дней назад

ELSA-2026-3966: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() syzbot reports: BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60 Read of size 8 at addr ffff88810de2d2c8 by task a.out/304 CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary) Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_report+0xd0/0x670 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? getrusage+0x1109/0x1a60 kasan_report+0xce/0x100 ? getrusage+0x1109/0x1a60 getrusage+0x1109/0x1a60 ? __pfx_getrusage+0x10/0x10 __io_uring_show_fdinfo+0x9fe/0x1790 ? ksys_read+0xf7/0x1c0 ? do_syscall_64+0xa4/0x260 ? vsnprintf+0x591/0x1100 ? __pfx___io_uring_show_fdinfo+0x10/0x10 ? __pfx_vsnprintf+0x10/0x10 ? mutex_trylock+0xcf/0x130 ? __pfx_mutex_trylock+0x10/0x10 ? __pfx_show_fd_locks+0x10/0x10 ? io_uring_show_fdinfo+0x57/0x80 io_uri...

CVSS3: 7.1
redhat
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() syzbot reports: BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60 Read of size 8 at addr ffff88810de2d2c8 by task a.out/304 CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary) Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_report+0xd0/0x670 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? getrusage+0x1109/0x1a60 kasan_report+0xce/0x100 ? getrusage+0x1109/0x1a60 getrusage+0x1109/0x1a60 ? __pfx_getrusage+0x10/0x10 __io_uring_show_fdinfo+0x9fe/0x1790 ? ksys_read+0xf7/0x1c0 ? do_syscall_64+0xa4/0x260 ? vsnprintf+0x591/0x1100 ? __pfx___io_uring_show_fdinfo+0x10/0x10 ? __pfx_vsnprintf+0x10/0x10 ? mutex_trylock+0xcf/0x130 ? __pfx_mutex_trylock+0x10/0x10 ? __pfx_show_fd_locks+0x10/0x10 ? io_uring_show_fdinfo+0x57/0x80 io_uri...

CVSS3: 7.8
nvd
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo() syzbot reports: BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60 Read of size 8 at addr ffff88810de2d2c8 by task a.out/304 CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary) Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_report+0xd0/0x670 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? getrusage+0x1109/0x1a60 kasan_report+0xce/0x100 ? getrusage+0x1109/0x1a60 getrusage+0x1109/0x1a60 ? __pfx_getrusage+0x10/0x10 __io_uring_show_fdinfo+0x9fe/0x1790 ? ksys_read+0xf7/0x1c0 ? do_syscall_64+0xa4/0x260 ? vsnprintf+0x591/0x1100 ? __pfx___io_uring_show_fdinfo+0x10/0x10 ? __pfx_vsnprintf+0x10/0x10 ? mutex_trylock+0xcf/0x130 ? __pfx_mutex_trylock+0x10/0x10 ? __pfx_show_fd_locks+0x10/0x10 ? io_uring_show_fdi

CVSS3: 7.8
debian
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...