ELSA-2026-13916 Important: Oracle Linux 10 fence-agents security update
ELSA-2026-13651 Moderate: Oracle Linux 10 systemd security update
ELSA-2026-13643 Important: Oracle Linux 10 osbuild-composer security update
ELSA-2026-13642 Important: Oracle Linux 10 image-builder security update
ELSA-2026-13566 Important: Oracle Linux 10 kernel security update
ELSA-2026-13641 Moderate: Oracle Linux 10 python-tornado security update
ELSA-2026-13498 Important: Oracle Linux 10 dovecot security update
ELBA-2026-13648 Oracle Linux 10 util-linux bug fix and enhancement update
ELSA-2026-13380 Important: Oracle Linux 10 openssh security update
ELBA-2026-13653 Oracle Linux 10 samba bug fix and enhancement update
ELBA-2026-13647 Oracle Linux 10 libguestfs bug fix and enhancement update
ELSA-2026-13515 Moderate: Oracle Linux 10 freeipmi security update
ELBA-2026-13652 Oracle Linux 10 libdnf bug fix and enhancement update
ELBA-2026-13646 Oracle Linux 10 virt-v2v bug fix and enhancement update
ELBA-2026-13645 Oracle Linux 10 passt bug fix and enhancement update
ELBA-2026-50252 Oracle Linux 10 oracle-indexhtml bug fix update
ELSA-2026-13857 Important: Oracle Linux 9 dovecot security update
ELSA-2026-13677 Moderate: Oracle Linux 9 systemd security update
ELSA-2026-13978 Moderate: Oracle Linux 9 libsoup security update
ELBA-2026-13678 Oracle Linux 9 samba bug fix and enhancement update
ELSA-2026-13671 Important: Oracle Linux 9 image-builder security update
ELSA-2026-13381 Important: Oracle Linux 9 openssh security update
ELSA-2026-13917 Important: Oracle Linux 9 fence-agents security update
ELSA-2026-13670 Moderate: Oracle Linux 9 python-tornado security update
ELSA-2026-13565 Important: Oracle Linux 9 kernel security update
ELBA-2026-13674 Oracle Linux 9 keylime bug fix and enhancement update
ELSA-2026-13577 Important: Oracle Linux 8 kernel security update
ELSA-2026-13830 Important: Oracle Linux 8 dovecot security update
ELSA-2026-13383 Important: Oracle Linux 8 openssh security update
ELSA-2026-13285 Important: Oracle Linux 8 libcap security update
ELSA-2026-13537 Important: Oracle Linux 8 thunderbird security update
ELSA-2026-13284 Important: Oracle Linux 8 LibRaw security update
ELSA-2026-13414 Important: Oracle Linux 8 tigervnc security update
ELBA-2026-13659 Oracle Linux 8 device-mapper-multipath bug fix and enhancement update
ELBA-2026-13662 Oracle Linux 8 dbus bug fix and enhancement update
ELBA-2026-13660 Oracle Linux 8 rng-tools bug fix and enhancement update
ELBA-2026-13658 Oracle Linux 8 krb5 bug fix and enhancement update
ELBA-2026-13656 Oracle Linux 8 lapack bug fix and enhancement update
ELBA-2026-13655 Oracle Linux 8 ksh bug fix and enhancement update
ELBA-2026-50248 Oracle Linux 8 cloud-init bug fix update
ELSA-2026-9614 Important: Oracle Linux 7 python security update
ELSA-2026-9745 Important: Oracle Linux 7 python3 security update
ELSA-2026-13916 Important: Oracle Linux 10 fence-agents security update
Oracle Linux Security Advisory ELSA-2026-13916
http://linux.oracle.com/errata/ELSA-2026-13916.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
fence-agents-aliyun-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-all-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-amt-ws-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-apc-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-apc-snmp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-aws-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-azure-arm-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-bladecenter-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-brocade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-cisco-mds-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-cisco-ucs-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-common-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-drac5-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-eaton-snmp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-emerson-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-eps-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-gce-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-heuristics-ping-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-hpblade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibm-powervs-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibm-vpc-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibmblade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ifmib-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-moonshot-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-mp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-ssh-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo2-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-intelmodular-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ipdu-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ipmilan-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-kdump-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-kubevirt-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-mpath-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-nutanix-ahv-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-openstack-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-redfish-4.16.0-13.el10_1.4.x86_64.rpm
fence-agents-rhevm-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-rsa-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-rsb-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-sbd-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-scsi-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-virsh-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-vmware-rest-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-vmware-soap-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-wti-4.16.0-13.el10_1.4.noarch.rpm
fence-virt-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-cpg-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-libvirt-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-multicast-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-serial-4.16.0-13.el10_1.4.x86_64.rpm
fence-virtd-tcp-4.16.0-13.el10_1.4.x86_64.rpm
ha-cloud-support-4.16.0-13.el10_1.4.x86_64.rpm
aarch64:
fence-agents-all-4.16.0-13.el10_1.4.aarch64.rpm
fence-agents-amt-ws-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-apc-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-apc-snmp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-bladecenter-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-brocade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-cisco-mds-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-cisco-ucs-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-common-4.16.0-13.el10_1.4.aarch64.rpm
fence-agents-drac5-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-eaton-snmp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-emerson-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-eps-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-heuristics-ping-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-hpblade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibm-powervs-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibm-vpc-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ibmblade-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ifmib-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-moonshot-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-mp-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo-ssh-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ilo2-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-intelmodular-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ipdu-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-ipmilan-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-kdump-4.16.0-13.el10_1.4.aarch64.rpm
fence-agents-kubevirt-4.16.0-13.el10_1.4.aarch64.rpm
fence-agents-mpath-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-nutanix-ahv-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-redfish-4.16.0-13.el10_1.4.aarch64.rpm
fence-agents-rhevm-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-rsa-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-rsb-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-sbd-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-scsi-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-virsh-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-vmware-rest-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-vmware-soap-4.16.0-13.el10_1.4.noarch.rpm
fence-agents-wti-4.16.0-13.el10_1.4.noarch.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/fence-agents-4.16.0-13.el10_1.4.src.rpm
Related CVEs:
CVE-2026-30922
CVE-2026-32597
Description of changes:
[4.16.0-13.4]
- bundled pyasn1: replace with dependency to fix CVE-2026-30922
- bundled PyJWT: upgrade to v2.12.1 to fix CVE-2026-32597
Resolves: RHEL-157186, RHEL-155667
ELSA-2026-13651 Moderate: Oracle Linux 10 systemd security update
Oracle Linux Security Advisory ELSA-2026-13651
http://linux.oracle.com/errata/ELSA-2026-13651.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
systemd-257-13.0.1.el10_1.3.x86_64.rpm
systemd-boot-unsigned-257-13.0.1.el10_1.3.x86_64.rpm
systemd-container-257-13.0.1.el10_1.3.x86_64.rpm
systemd-devel-257-13.0.1.el10_1.3.x86_64.rpm
systemd-journal-remote-257-13.0.1.el10_1.3.x86_64.rpm
systemd-libs-257-13.0.1.el10_1.3.x86_64.rpm
systemd-oomd-257-13.0.1.el10_1.3.x86_64.rpm
systemd-pam-257-13.0.1.el10_1.3.x86_64.rpm
systemd-resolved-257-13.0.1.el10_1.3.x86_64.rpm
systemd-rpm-macros-257-13.0.1.el10_1.3.noarch.rpm
systemd-udev-257-13.0.1.el10_1.3.x86_64.rpm
systemd-ukify-257-13.0.1.el10_1.3.noarch.rpm
aarch64:
systemd-257-13.0.1.el10_1.3.aarch64.rpm
systemd-boot-unsigned-257-13.0.1.el10_1.3.aarch64.rpm
systemd-container-257-13.0.1.el10_1.3.aarch64.rpm
systemd-devel-257-13.0.1.el10_1.3.aarch64.rpm
systemd-journal-remote-257-13.0.1.el10_1.3.aarch64.rpm
systemd-libs-257-13.0.1.el10_1.3.aarch64.rpm
systemd-oomd-257-13.0.1.el10_1.3.aarch64.rpm
systemd-pam-257-13.0.1.el10_1.3.aarch64.rpm
systemd-resolved-257-13.0.1.el10_1.3.aarch64.rpm
systemd-rpm-macros-257-13.0.1.el10_1.3.noarch.rpm
systemd-udev-257-13.0.1.el10_1.3.aarch64.rpm
systemd-ukify-257-13.0.1.el10_1.3.noarch.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/systemd-257-13.0.1.el10_1.3.src.rpm
Related CVEs:
CVE-2026-29111
Description of changes:
[257-13.0.1.el10_1.3]
- Fix detection of Oracle Virtualization or BM envs [Orabug: 37531877]
- Avoid udevadm warnings when using udev valid configs [Orabug: 37503197]
- allow dm remove ioctl to co-operate with UEK3 [Orabug: 18467469]
- set "RemoveIPC=no" in logind.conf as default [Orabug: 22224874]
- Fix missing netdev for iscsi entry in fstab [Orabug: 25897792]
- udev rules: fix memory hot add and remove [Orabug: 31310273]
- Disable unprivileged BPF by default [Orabug: 32870980]
- Remove upstream references [Orabug: 33995357]
- Wait for an extra configurable time before udevd kills a worker [Orabug: 36017407]
- Removed unneeded patches from the systemd.spec
- 1004-orabug34272490-0001-core-device-ignore-DEVICE_FOUND_UDEV-bit-on-switchin.patch [Orabug: 34272490]
- 1005-orabug34272490-0002-core-device-drop-unnecessary-condition.patch [Orabug: 34272490]
- 1006-orabug34467234-shutdown-get-only-active-md-arrays.patch [Orabug: 34467234]
- 1007-orabug34868110-pstore-fixes-for-dmesg.txt-reconstruction.patch [Orabug: 34868110]
- 1008-path-drop-IN_ATTRIB-from-parent-directory-watches.patch [Orabug: 36780432]
[257-13.3]
- ci: re-enable bpf-framework option for build and unit test jobs (RHEL-155394)
- ci: add bpftool workaround to codeql job too (RHEL-155394)
- ci: fix workaround about bpftool for codeql (RHEL-155394)
- ci: add bpftool workaround to coverity too (RHEL-155394)
- ci: pin Packit/mkosi to the latest RHEL 10.1 commit (RHEL-155394)
- ci: run apt-get update before running mkosi (RHEL-155394)
- path-util: add flavour of path_startswith() that leaves a leading slash in place (RHEL-155394)
- cgroup: port some code over to path_startswith_full() (RHEL-155394)
- path-util: invert PATH_STARTSWITH_ACCEPT_DOT_DOT flag (RHEL-155394)
- sd-json: fix off-by-one issue when updating parent for array elements (RHEL-155394)
- core/cgroup: avoid one unnecessary strjoina() (RHEL-155394)
- core: validate input cgroup path more prudently (RHEL-155394)
[257-13.2]
- Revert "coredump: fix 0-passed-as-pointer warning" (RHEL-104135)
- Revert "Define helper to call PR_SET_DUMPABLE" (RHEL-104135)
- Revert "coredump: introduce an enum to wrap dumpable constants" (RHEL-104135)
- Revert "coredump: when %F/pidfd is used, again allow forwarding to containers" (RHEL-104135)
- Revert "coredump: add support for new %F PIDFD specifier" (RHEL-104135)
- Revert "coredump: get rid of a bogus assertion" (RHEL-104135)
- Revert "coredump: also stop forwarding non-dumpable processes" (RHEL-104135)
- Revert "coredump: use %d in kernel core pattern" (RHEL-104135)
- Revert "coredump: get rid of _META_MANDATORY_MAX" (RHEL-104135)
- Revert "coredump: wrap long lines, fix grammar in comments" (RHEL-104135)
- Revert "coredump: restore compatibility with older patterns" (RHEL-104135)
- Revert "coredump: verify pidfd after parsing data in usermode helper" (RHEL-104135)
[257-13.1]
- coredump: verify pidfd after parsing data in usermode helper (RHEL-104135)
- coredump: restore compatibility with older patterns (RHEL-104135)
- coredump: wrap long lines, fix grammar in comments (RHEL-104135)
- coredump: get rid of _META_MANDATORY_MAX (RHEL-104135)
- coredump: use %d in kernel core pattern (RHEL-104135)
- coredump: also stop forwarding non-dumpable processes (RHEL-104135)
- coredump: get rid of a bogus assertion (RHEL-104135)
- coredump: add support for new %F PIDFD specifier (RHEL-104135)
- coredump: when %F/pidfd is used, again allow forwarding to containers (RHEL-104135)
- coredump: introduce an enum to wrap dumpable constants (RHEL-104135)
- Define helper to call PR_SET_DUMPABLE (RHEL-104135)
- coredump: fix 0-passed-as-pointer warning (RHEL-104135)
ELSA-2026-13643 Important: Oracle Linux 10 osbuild-composer security update
Oracle Linux Security Advisory ELSA-2026-13643
http://linux.oracle.com/errata/ELSA-2026-13643.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
osbuild-composer-149-6.0.1.el10_1.x86_64.rpm
osbuild-composer-core-149-6.0.1.el10_1.x86_64.rpm
osbuild-composer-worker-149-6.0.1.el10_1.x86_64.rpm
aarch64:
osbuild-composer-149-6.0.1.el10_1.aarch64.rpm
osbuild-composer-core-149-6.0.1.el10_1.aarch64.rpm
osbuild-composer-worker-149-6.0.1.el10_1.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/osbuild-composer-149-6.0.1.el10_1.src.rpm
Related CVEs:
CVE-2026-25679
Description of changes:
[149-6.0.1]
- Add missing dependency over dracut-config-rescue for image-installer [Orabug: 38587453]
- Add OL10 support
- Update repository URLs for baseos, appstream and UERK
- Fix the label for UEKR repository
- Simplify repository names [JIRA: OLDIS-35893]
- Ensure build on latest golang: CVE-2024-34156
- Refactor patches to fix some naming and set a correct kernel for Oracle Linux [Orabug: 37253643]
- Support using OCI variables inside built images [JIRA: OLDIS-35302]
- Support using repository definitons with OCI variables [JIRA: OLDIS-38657]
- Update repositories to contain OCI variables
- Remove image types Minimal-raw and wsl [JIRA: OLDIS-38123]
- Increase default /boot size to 1GB [Orabug: 36827079]
- Add support for OCI hybrid images [JIRA: OLDIS-33593]
- enable aarch64 OCI image builds [JIRA: OLDIS-33593]
- support for building OL8/9 images on Oracle Linux 9 [Orabug: 36400619]
[149-6]
- Rebuilt to fix:
- CVE-2026-25679
- CVE-2026-27137
- RHEL-158464
- RHEL-158602
ELSA-2026-13642 Important: Oracle Linux 10 image-builder security update
Oracle Linux Security Advisory ELSA-2026-13642
http://linux.oracle.com/errata/ELSA-2026-13642.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
image-builder-45-1.0.4.el10_1.x86_64.rpm
aarch64:
image-builder-45-1.0.4.el10_1.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/image-builder-45-1.0.4.el10_1.src.rpm
Related CVEs:
CVE-2026-25679
Description of changes:
[45-1.0.4]
- Rebuilt to fix CVE-2026-25679, CVE-2026-27137
ELSA-2026-13566 Important: Oracle Linux 10 kernel security update
Oracle Linux Security Advisory ELSA-2026-13566
http://linux.oracle.com/errata/ELSA-2026-13566.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
kernel-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-abi-stablelists-6.12.0-124.55.1.el10_1.noarch.rpm
kernel-core-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-cross-headers-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-core-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-devel-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-devel-matched-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-modules-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-modules-core-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-modules-extra-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-debug-uki-virt-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-devel-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-devel-matched-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-doc-6.12.0-124.55.1.el10_1.noarch.rpm
kernel-headers-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-modules-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-modules-core-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-modules-extra-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-modules-extra-matched-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-tools-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-tools-libs-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-tools-libs-devel-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-uki-virt-6.12.0-124.55.1.el10_1.x86_64.rpm
kernel-uki-virt-addons-6.12.0-124.55.1.el10_1.x86_64.rpm
libperf-6.12.0-124.55.1.el10_1.x86_64.rpm
perf-6.12.0-124.55.1.el10_1.x86_64.rpm
python3-perf-6.12.0-124.55.1.el10_1.x86_64.rpm
rtla-6.12.0-124.55.1.el10_1.x86_64.rpm
rv-6.12.0-124.55.1.el10_1.x86_64.rpm
aarch64:
kernel-cross-headers-6.12.0-124.55.1.el10_1.aarch64.rpm
kernel-headers-6.12.0-124.55.1.el10_1.aarch64.rpm
kernel-tools-6.12.0-124.55.1.el10_1.aarch64.rpm
kernel-tools-libs-6.12.0-124.55.1.el10_1.aarch64.rpm
kernel-tools-libs-devel-6.12.0-124.55.1.el10_1.aarch64.rpm
libperf-6.12.0-124.55.1.el10_1.aarch64.rpm
perf-6.12.0-124.55.1.el10_1.aarch64.rpm
python3-perf-6.12.0-124.55.1.el10_1.aarch64.rpm
rtla-6.12.0-124.55.1.el10_1.aarch64.rpm
rv-6.12.0-124.55.1.el10_1.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/kernel-6.12.0-124.55.1.el10_1.src.rpm
Related CVEs:
CVE-2026-23270
CVE-2026-31402
CVE-2026-31419
CVE-2026-31431
Description of changes:
[6.12.0-124.55.1]
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985782]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64