Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-6053

Опубликовано: 30 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2026-6053: kernel security update (MODERATE)

[6.12.0-124.47.1]

  • Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985782]
  • Disable UKI signing [Orabug: 36571828]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Add Oracle Linux IMA certificates
  • Update module name for cryptographic module [Orabug: 37400433]
  • Clean git history at setup stage

[6.12.0-124.47.1]

  • dpll: zl3073x: Fix output pin phase adjustment sign (Ivan Vecera) [RHEL-149766]
  • redhat: genlog: add new JIRA cloud server hostname (Jan Stancek)
  • scsi: qla2xxx: Fix bsg_done() causing double free (Ewan D. Milne) [RHEL-153413] {CVE-2025-71238}
  • mm/debug_vm_pgtable: clear page table entries at destroy_args() (Herton R. Krzesinski) [RHEL-127317]

[6.12.0-124.46.1]

  • netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (CKI Backport Bot) [RHEL-153272] {CVE-2026-23231}

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

kernel-headers

6.12.0-124.47.1.el10_1

perf

6.12.0-124.47.1.el10_1

python3-perf

6.12.0-124.47.1.el10_1

rtla

6.12.0-124.47.1.el10_1

rv

6.12.0-124.47.1.el10_1

kernel-tools

6.12.0-124.47.1.el10_1

kernel-tools-libs

6.12.0-124.47.1.el10_1

kernel-cross-headers

6.12.0-124.47.1.el10_1

kernel-tools-libs-devel

6.12.0-124.47.1.el10_1

libperf

6.12.0-124.47.1.el10_1

Oracle Linux x86_64

kernel

6.12.0-124.47.1.el10_1

kernel-abi-stablelists

6.12.0-124.47.1.el10_1

kernel-core

6.12.0-124.47.1.el10_1

kernel-debug

6.12.0-124.47.1.el10_1

kernel-debug-core

6.12.0-124.47.1.el10_1

kernel-debug-modules

6.12.0-124.47.1.el10_1

kernel-debug-modules-core

6.12.0-124.47.1.el10_1

kernel-debug-modules-extra

6.12.0-124.47.1.el10_1

kernel-debug-uki-virt

6.12.0-124.47.1.el10_1

kernel-modules

6.12.0-124.47.1.el10_1

kernel-modules-core

6.12.0-124.47.1.el10_1

kernel-modules-extra

6.12.0-124.47.1.el10_1

kernel-modules-extra-matched

6.12.0-124.47.1.el10_1

kernel-tools

6.12.0-124.47.1.el10_1

kernel-tools-libs

6.12.0-124.47.1.el10_1

kernel-uki-virt

6.12.0-124.47.1.el10_1

kernel-uki-virt-addons

6.12.0-124.47.1.el10_1

kernel-debug-devel

6.12.0-124.47.1.el10_1

kernel-debug-devel-matched

6.12.0-124.47.1.el10_1

kernel-devel

6.12.0-124.47.1.el10_1

kernel-devel-matched

6.12.0-124.47.1.el10_1

kernel-doc

6.12.0-124.47.1.el10_1

kernel-headers

6.12.0-124.47.1.el10_1

perf

6.12.0-124.47.1.el10_1

python3-perf

6.12.0-124.47.1.el10_1

rtla

6.12.0-124.47.1.el10_1

rv

6.12.0-124.47.1.el10_1

kernel-cross-headers

6.12.0-124.47.1.el10_1

kernel-tools-libs-devel

6.12.0-124.47.1.el10_1

libperf

6.12.0-124.47.1.el10_1

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. This creates two use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses table->chains under rcu_read_lock(). A concurrent dump can still be walking the chain when the error path frees it. 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be dereferencing chain->blob_gen_X when the error path frees the chain. Add synchronize_rcu() between nft_chain_del() and the chain destroy so that all RCU reader...

CVSS3: 7.5
redhat
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. This creates two use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses table->chains under rcu_read_lock(). A concurrent dump can still be walking the chain when the error path frees it. 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be dereferencing chain->blob_gen_X when the error path frees the chain. Add synchronize_rcu() between nft_chain_del() and the chain destroy so that all RCU reader...

CVSS3: 7.8
nvd
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy() with no RCU grace period in between. This creates two use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses table->chains under rcu_read_lock(). A concurrent dump can still be walking the chain when the error path frees it. 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be dereferencing chain->blob_gen_X when the error path frees the chain. Add synchronize_rcu() between nft_chain_del() and the chain d

CVSS3: 7.1
msrc
20 дней назад

netfilter: nf_tables: fix use-after-free in nf_tables_addchain()

CVSS3: 7.8
debian
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...