Oracle Linux 6478 Published by

Oracle has rolled out a series of critical security advisories covering Unbreakable Enterprise Kernel updates across Linux versions 8 through 10. These kernel patches primarily target cryptographic vulnerabilities tied to CVE-2026-31431 while also resolving memory overflow issues and correcting processor instruction handling on Zen1 hardware. Administrators managing Oracle Linux 10 will also find important fixes for the libcap library that address a dangerous time-of-check-to-time-of-use race condition. Meanwhile, Thunderbird receives a major version jump to its latest extended support release with comprehensive security hardening applied across dozens of identified flaws.

ELSA-2026-50255 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50253 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50254 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-50254 Important: Unbreakable Enterprise kernel security update: Copy Fail
ELSA-2026-12423 Important: Oracle Linux 10 libcap security update
ELSA-2026-12285 Important: Oracle Linux 10 thunderbird security update




ELSA-2026-50255 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50255

http://linux.oracle.com/errata/ELSA-2026-50255.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-container-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-container-debug-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-debug-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-debug-devel-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-devel-5.4.17-2136.354.4.2.el7uek.x86_64.rpm
kernel-uek-doc-5.4.17-2136.354.4.2.el7uek.noarch.rpm
kernel-uek-tools-5.4.17-2136.354.4.2.el7uek.x86_64.rpm

SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-5.4.17-2136.354.4.2.el7uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.4.17-2136.354.4.2]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39292250]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39292250]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39292250]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39292250]
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250] {CVE-2026-31431}
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39292250]
- crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c (Randy Dunlap) [Orabug: 39292250]
- x86/CPU: Fix FPDSS on Zen1 (Siddh Raman Pant) [Orabug: 39292236]



ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50255

http://linux.oracle.com/errata/ELSA-2026-50255.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

aarch64:
kernel-uek-5.4.17-2136.354.4.2.el8uek.aarch64.rpm
kernel-uek-debug-5.4.17-2136.354.4.2.el8uek.aarch64.rpm
kernel-uek-debug-devel-5.4.17-2136.354.4.2.el8uek.aarch64.rpm
kernel-uek-devel-5.4.17-2136.354.4.2.el8uek.aarch64.rpm
kernel-uek-doc-5.4.17-2136.354.4.2.el8uek.noarch.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/kernel-uek-5.4.17-2136.354.4.2.el8uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.4.17-2136.354.4.2]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39292250]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39292250]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39292250]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39292250]
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250] {CVE-2026-31431}
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39292250]
- crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c (Randy Dunlap) [Orabug: 39292250]
- x86/CPU: Fix FPDSS on Zen1 (Siddh Raman Pant) [Orabug: 39292236]



ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50255

http://linux.oracle.com/errata/ELSA-2026-50255.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-container-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-container-debug-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-debug-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-debug-devel-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-devel-5.4.17-2136.354.4.2.el8uek.x86_64.rpm
kernel-uek-doc-5.4.17-2136.354.4.2.el8uek.noarch.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/kernel-uek-5.4.17-2136.354.4.2.el8uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.4.17-2136.354.4.2]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39292250]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39292250]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39292250]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39292250]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39292250]
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292250] {CVE-2026-31431}
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39292250]
- crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c (Randy Dunlap) [Orabug: 39292250]
- x86/CPU: Fix FPDSS on Zen1 (Siddh Raman Pant) [Orabug: 39292236]



ELSA-2026-50253 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50253

http://linux.oracle.com/errata/ELSA-2026-50253.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-core-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-debug-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-debug-core-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-debug-devel-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-debug-modules-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-debug-modules-extra-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-devel-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-doc-5.15.0-319.201.4.4.el8uek.noarch.rpm
kernel-uek-modules-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-modules-extra-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-container-5.15.0-319.201.4.4.el8uek.x86_64.rpm
kernel-uek-container-debug-5.15.0-319.201.4.4.el8uek.x86_64.rpm

aarch64:
bpftool-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-core-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-debug-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-debug-core-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-debug-devel-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-debug-modules-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-debug-modules-extra-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-devel-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-doc-5.15.0-319.201.4.4.el8uek.noarch.rpm
kernel-uek-modules-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-modules-extra-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-container-5.15.0-319.201.4.4.el8uek.aarch64.rpm
kernel-uek-container-debug-5.15.0-319.201.4.4.el8uek.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/kernel-uek-5.15.0-319.201.4.4.el8uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.15.0-319.201.4.4]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39291961]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39291961]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39291961]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39291961] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39291961]
- uek-rpm: Enable FWCTL for aarch64 (Dave Kleikamp) [Orabug: 39291938]



ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50253

http://linux.oracle.com/errata/ELSA-2026-50253.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

aarch64:
bpftool-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-container-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-container-debug-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-core-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-debug-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-debug-core-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-debug-devel-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-debug-modules-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-debug-modules-extra-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-devel-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-doc-5.15.0-319.201.4.4.el9uek.noarch.rpm
kernel-uek-modules-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek-modules-extra-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek64k-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek64k-core-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek64k-devel-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek64k-modules-5.15.0-319.201.4.4.el9uek.aarch64.rpm
kernel-uek64k-modules-extra-5.15.0-319.201.4.4.el9uek.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/kernel-uek-5.15.0-319.201.4.4.el9uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.15.0-319.201.4.4]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39291961]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39291961]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39291961]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39291961] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39291961]
- uek-rpm: Enable FWCTL for aarch64 (Dave Kleikamp) [Orabug: 39291938]



ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50253

http://linux.oracle.com/errata/ELSA-2026-50253.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-core-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-debug-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-debug-core-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-debug-devel-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-debug-modules-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-debug-modules-extra-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-devel-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-doc-5.15.0-319.201.4.4.el9uek.noarch.rpm
kernel-uek-modules-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-modules-extra-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-container-5.15.0-319.201.4.4.el9uek.x86_64.rpm
kernel-uek-container-debug-5.15.0-319.201.4.4.el9uek.x86_64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/kernel-uek-5.15.0-319.201.4.4.el9uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[5.15.0-319.201.4.4]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39291961]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39291961]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39291961]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39291961]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39291961] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39291961]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39291961]
- uek-rpm: Enable FWCTL for aarch64 (Dave Kleikamp) [Orabug: 39291938]



ELSA-2026-50254 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50254

http://linux.oracle.com/errata/ELSA-2026-50254.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-core-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-core-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-devel-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-core-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-deprecated-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-desktop-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-extra-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-extra-netfilter-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-usb-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-debug-modules-wireless-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-devel-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-doc-6.12.0-201.74.2.2.el9uek.noarch.rpm
kernel-uek-modules-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-core-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-deprecated-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-desktop-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-extra-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-extra-netfilter-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-usb-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-modules-wireless-6.12.0-201.74.2.2.el9uek.x86_64.rpm
kernel-uek-tools-6.12.0-201.74.2.2.el9uek.x86_64.rpm

aarch64:
kernel-uek-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-devel-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-deprecated-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-desktop-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-extra-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-extra-netfilter-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-usb-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-debug-modules-wireless-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-devel-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-doc-6.12.0-201.74.2.2.el9uek.noarch.rpm
kernel-uek-modules-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-extra-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-deprecated-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-desktop-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-extra-netfilter-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-usb-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-modules-wireless-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek-tools-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-devel-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-core-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-deprecated-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-desktop-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-extra-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-extra-netfilter-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-usb-6.12.0-201.74.2.2.el9uek.aarch64.rpm
kernel-uek64k-modules-wireless-6.12.0-201.74.2.2.el9uek.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/kernel-uek-6.12.0-201.74.2.2.el9uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[6.12.0-201.74.2.2]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39292190]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39292190]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39292190]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292190]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39292190]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39292190] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292190]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39292190]
- uek-rpm: Enable FWCTL modules for aarch64 (Dave Kleikamp) [Orabug: 39292173]
- uek-rpm: CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON should be set (Dave Kleikamp) [Orabug: 39292151]
- x86/CPU: Fix FPDSS on Zen1 (Borislav Petkov (AMD)) [Orabug: 39292145]



ELSA-2026-50254 Important: Unbreakable Enterprise kernel security update: Copy Fail


Oracle Linux Security Advisory ELSA-2026-50254

http://linux.oracle.com/errata/ELSA-2026-50254.html

The following updated rpms for have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-core-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-devel-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-doc-6.12.0-201.74.2.2.el10uek.noarch.rpm
kernel-uek-modules-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-core-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-deprecated-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-desktop-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-extra-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-extra-netfilter-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-usb-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-modules-wireless-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-tools-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-core-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-devel-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-core-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-deprecated-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-desktop-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-extra-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-extra-netfilter-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-usb-6.12.0-201.74.2.2.el10uek.x86_64.rpm
kernel-uek-debug-modules-wireless-6.12.0-201.74.2.2.el10uek.x86_64.rpm

aarch64:
kernel-uek-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-devel-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-doc-6.12.0-201.74.2.2.el10uek.noarch.rpm
kernel-uek-modules-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-deprecated-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-desktop-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-extra-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-extra-netfilter-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-usb-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-modules-wireless-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-tools-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-devel-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-deprecated-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-desktop-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-extra-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-extra-netfilter-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-usb-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek-debug-modules-wireless-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-devel-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-core-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-deprecated-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-desktop-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-extra-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-extra-netfilter-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-usb-6.12.0-201.74.2.2.el10uek.aarch64.rpm
kernel-uek64k-modules-wireless-6.12.0-201.74.2.2.el10uek.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/kernel-uek-6.12.0-201.74.2.2.el10uek.src.rpm

Related CVEs:

CVE-2026-31431

Description of changes:

[6.12.0-201.74.2.2]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39292190]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39292190]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39292190]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292190]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39292190]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39292190] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39292190]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39292190]
- uek-rpm: Enable FWCTL modules for aarch64 (Dave Kleikamp) [Orabug: 39292173]
- uek-rpm: CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON should be set (Dave Kleikamp) [Orabug: 39292151]
- x86/CPU: Fix FPDSS on Zen1 (Borislav Petkov (AMD)) [Orabug: 39292145]



ELSA-2026-12423 Important: Oracle Linux 10 libcap security update


Oracle Linux Security Advisory ELSA-2026-12423

http://linux.oracle.com/errata/ELSA-2026-12423.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
libcap-2.69-7.el10_1.1.x86_64.rpm
libcap-devel-2.69-7.el10_1.1.x86_64.rpm

aarch64:
libcap-2.69-7.el10_1.1.aarch64.rpm
libcap-devel-2.69-7.el10_1.1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/libcap-2.69-7.el10_1.1.src.rpm

Related CVEs:

CVE-2026-4878

Description of changes:

[2.69-7.1]
- Fix TOCTOU race condition in cap_set_file() (CVE-2026-4878)
Resolves: RHEL-169301



ELSA-2026-12285 Important: Oracle Linux 10 thunderbird security update


Oracle Linux Security Advisory ELSA-2026-12285

http://linux.oracle.com/errata/ELSA-2026-12285.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
thunderbird-140.10.0-1.0.1.el10_1.x86_64.rpm

aarch64:
thunderbird-140.10.0-1.0.1.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/thunderbird-140.10.0-1.0.1.el10_1.src.rpm

Related CVEs:

CVE-2026-6746
CVE-2026-6747
CVE-2026-6748
CVE-2026-6749
CVE-2026-6750
CVE-2026-6751
CVE-2026-6752
CVE-2026-6753
CVE-2026-6754
CVE-2026-6757
CVE-2026-6759
CVE-2026-6761
CVE-2026-6762
CVE-2026-6763
CVE-2026-6764
CVE-2026-6765
CVE-2026-6766
CVE-2026-6767
CVE-2026-6769
CVE-2026-6770
CVE-2026-6771
CVE-2026-6772
CVE-2026-6776
CVE-2026-6785
CVE-2026-6786

Description of changes:

[140.10.0-1.0.1]
- Add Oracle prefs

[140.10.0-1]
- Update to 140.10.0 ESR