Oracle Linux 6441 Published by

Oracle has released several security updates for various Linux versions, including Oracle Linux 10 and Oracle Linux 9, to address vulnerabilities and fix bugs. These updates include fixes for issues with packages such as iperf3, openssl, php, python3, and util-linux, among others. Additionally, the kernel has been updated on Oracle Linux 7 to address various security concerns and bug fixes. The updates are available on the Unbreakable Linux Network (ULN) and can be accessed through links provided in the security advisories.

ELBA-2026-50073 Oracle Linux 10 shim bug fix update
ELSA-2026-1597 Moderate: Oracle Linux 10 iperf3 security update
ELSA-2026-1472 Important: Oracle Linux 10 openssl security update
ELBA-2026-1365 Oracle Linux 9 cloud-init bug fix and enhancement update
ELSA-2026-1595 Moderate: Oracle Linux 9 iperf3 security update
ELSA-2026-1478 Moderate: Oracle Linux 9 python3.9 security update
ELSA-2026-1473 Important: Oracle Linux 9 openssl security update
ELSA-2026-1429 Important: Oracle Linux 9 php:8.3 security update
ELSA-2026-1409 Important: Oracle Linux 9 php:8.2 security update
ELSA-2026-50076 Moderate: Oracle Linux 9 image-builder security update
ELSA-2026-1592 Moderate: Oracle Linux 8 iperf3 security update
ELSA-2026-1574 Important: Oracle Linux 8 gimp:2.8 security update
ELSA-2026-1518 Important: Oracle Linux 8 grafana-pcp security update
ELSA-2026-1380 Moderate: Oracle Linux 8 osbuild-composer security update
ELSA-2025-23947 Moderate: Oracle Linux 7 kernel security update
ELSA-2025-22910 Moderate: Oracle Linux 7 kernel security update
ELSA-2026-1696 Moderate: Oracle Linux 10 util-linux security update
ELSA-2026-1714 Moderate: Oracle Linux 10 wireshark security update
ELSA-2026-1715 Important: Oracle Linux 10 golang-github-openprinting-ipp-usb security update
ELSA-2026-1628 Important: Oracle Linux 10 php security update




ELBA-2026-50073 Oracle Linux 10 shim bug fix update


Oracle Linux Bug Fix Advisory ELBA-2026-50073

http://linux.oracle.com/errata/ELBA-2026-50073.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
shim-x64-16.1-1.0.2.el10.x86_64.rpm
shim-unsigned-x64-16.1-1.0.2.el10.x86_64.rpm

aarch64:
shim-aa64-16.1-1.0.2.el10.aarch64.rpm
shim-unsigned-aarch64-16.1-2.0.2.el10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/shim-16.1-1.0.2.el10.src.rpm
http://oss.oracle.com/ol10/SRPMS-updates/shim-unsigned-x64-16.1-1.0.2.el10.src.rpm

Description of changes:

shim
[16.1-1.0.2.el10]
- Update shimx64.efi and shimaa64.efi v16.1 signed by Microsoft [Orabug: 38397604]
- Update vendor shim v16.1 binaries signed with Oracle Secure Boot Signing (key 2) [Orabug: 38397604]

[16.1-1.0.1.el10]
- Update shim to upstream v16.1 [Orabug: 38397604]

shim-unsigned-x64
[16.1-1.0.2.el10]
- Update SBAT_AUTOMATIC_DATE to 2024010900 [Orabug: 38397604]

[16.1-1.0.1.el10]
- Update shim to upstream v16.1 [Orabug: 38397604]
- Update Oracle sbat metadata and vendor certificates [Orabug: 38397604]



ELSA-2026-1597 Moderate: Oracle Linux 10 iperf3 security update


Oracle Linux Security Advisory ELSA-2026-1597

http://linux.oracle.com/errata/ELSA-2026-1597.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
iperf3-3.17.1-5.el10_1.x86_64.rpm

aarch64:
iperf3-3.17.1-5.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/iperf3-3.17.1-5.el10_1.src.rpm

Related CVEs:

CVE-2025-54349

Description of changes:

[3.17.1-5]
- Resolves: RHEL-136170 - iperf Heap Buffer Overflow (CVE-2025-54349)



ELSA-2026-1472 Important: Oracle Linux 10 openssl security update


Oracle Linux Security Advisory ELSA-2026-1472

http://linux.oracle.com/errata/ELSA-2026-1472.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
openssl-3.5.1-7.0.1.el10_1.x86_64.rpm
openssl-devel-3.5.1-7.0.1.el10_1.x86_64.rpm
openssl-libs-3.5.1-7.0.1.el10_1.x86_64.rpm
openssl-perl-3.5.1-7.0.1.el10_1.x86_64.rpm

aarch64:
openssl-3.5.1-7.0.1.el10_1.aarch64.rpm
openssl-devel-3.5.1-7.0.1.el10_1.aarch64.rpm
openssl-libs-3.5.1-7.0.1.el10_1.aarch64.rpm
openssl-perl-3.5.1-7.0.1.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/openssl-3.5.1-7.0.1.el10_1.src.rpm

Related CVEs:

CVE-2025-11187
CVE-2025-15467
CVE-2025-15468
CVE-2025-15469
CVE-2025-66199
CVE-2025-68160
CVE-2025-69418
CVE-2025-69419
CVE-2025-69420
CVE-2025-69421
CVE-2026-22795
CVE-2026-22796

Description of changes:

[3.5.1-7.0.1]
- Replace upstream references [Orabug: 34340177]
- Update FIPS provider name [Orabug: 35824276]

[1:3.5.1-7]
- Fix CVE-2025-11187 CVE-2025-15467 CVE-2025-15468 CVE-2025-15469
CVE-2025-66199 CVE-2025-68160 CVE-2025-69418 CVE-2025-69419 CVE-2025-69420
CVE-2025-69421 CVE-2026-22795 CVE-2026-22796
Resolves: RHEL-142062
Resolves: RHEL-141985
Resolves: RHEL-142053
Resolves: RHEL-142049
Resolves: RHEL-142045
Resolves: RHEL-142041
Resolves: RHEL-142037
Resolves: RHEL-142033
Resolves: RHEL-142029
Resolves: RHEL-142008
Resolves: RHEL-142025
Resolves: RHEL-142021

[1:3.5.1-6]
- Fix AES/GCM ppc64le encrypt/decrypt
Resolves: RHEL-139108



ELBA-2026-1365 Oracle Linux 9 cloud-init bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2026-1365

http://linux.oracle.com/errata/ELBA-2026-1365.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
cloud-init-24.4-7.0.1.el9_7.1.noarch.rpm

aarch64:
cloud-init-24.4-7.0.1.el9_7.1.noarch.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/cloud-init-24.4-7.0.1.el9_7.1.src.rpm

Description of changes:

[24.4-7.0.1.el9_7.1]
- Fix Oracle Datasource network and getdata methods for OCI OL [Orabug: 35950168]
- Fix log file permission [Orabug: 35302969]
- Update detection logic for OL distros in config template [Orabug: 34845400]
- Added missing services in rhel/systemd/cloud-init.service [Orabug: 32183938]
- Added missing services in cloud-init.service.tmpl for sshd [Orabug: 32183938]
- Forward port applicable cloud-init 18.4-2.0.3 changes to cloud-init-18-5 [Orabug: 30435672]
- limit permissions [Orabug: 31352433]
- Changes to ignore all enslaved interfaces [Orabug: 30092148]
- Make Oracle datasource detect dracut based config files [Orabug: 29956753]
- add modified version of enable-ec2_utils-to-stop-retrying-to-get-ec2-metadata.patch:
1. Enable ec2_utils.py having a way to stop retrying to get ec2 metadata
2. Apply stop retrying to get ec2 metadata to helper/openstack.py MetadataReader
Resolves: Oracle-Bug:41660 (Bugzilla)
- added OL to list of known distros
Resolves: rhbz#1427280
Resolves: rhbz#1427280

[24.4-7.el9_7.1]
- ci-downstream-Do-not-override-changes-in-disable-sshd-k.patch [RHEL-128876]
- Resolves: RHEL-128876
([rhel-9] cloud-init upgrade is overwriting modifications in disable-sshd-keygen-if-cloud-init-active.conf)



ELSA-2026-1595 Moderate: Oracle Linux 9 iperf3 security update


Oracle Linux Security Advisory ELSA-2026-1595

http://linux.oracle.com/errata/ELSA-2026-1595.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
iperf3-3.9-14.el9_7.1.i686.rpm
iperf3-3.9-14.el9_7.1.x86_64.rpm

aarch64:
iperf3-3.9-14.el9_7.1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/iperf3-3.9-14.el9_7.1.src.rpm

Related CVEs:

CVE-2025-54349

Description of changes:

[3.9-14.1]
- Resolves: RHEL-136181 - iperf Heap Buffer Overflow (CVE-2025-54349)



ELSA-2026-1478 Moderate: Oracle Linux 9 python3.9 security update


Oracle Linux Security Advisory ELSA-2026-1478

http://linux.oracle.com/errata/ELSA-2026-1478.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
python-unversioned-command-3.9.25-3.0.1.el9_7.noarch.rpm
python3-3.9.25-3.0.1.el9_7.i686.rpm
python3-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-debug-3.9.25-3.0.1.el9_7.i686.rpm
python3-debug-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-devel-3.9.25-3.0.1.el9_7.i686.rpm
python3-devel-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-idle-3.9.25-3.0.1.el9_7.i686.rpm
python3-idle-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-libs-3.9.25-3.0.1.el9_7.i686.rpm
python3-libs-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-test-3.9.25-3.0.1.el9_7.i686.rpm
python3-test-3.9.25-3.0.1.el9_7.x86_64.rpm
python3-tkinter-3.9.25-3.0.1.el9_7.i686.rpm
python3-tkinter-3.9.25-3.0.1.el9_7.x86_64.rpm

aarch64:
python-unversioned-command-3.9.25-3.0.1.el9_7.noarch.rpm
python3-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-debug-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-devel-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-idle-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-libs-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-test-3.9.25-3.0.1.el9_7.aarch64.rpm
python3-tkinter-3.9.25-3.0.1.el9_7.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/python3.9-3.9.25-3.0.1.el9_7.src.rpm

Related CVEs:

CVE-2025-12084

Description of changes:

[3.9.25-3.0.1]
- Remove upstream URL reference

[3.9.25-3]
- Security fix for CVE-2025-12084
Resolves: RHEL-135897



ELSA-2026-1473 Important: Oracle Linux 9 openssl security update


Oracle Linux Security Advisory ELSA-2026-1473

http://linux.oracle.com/errata/ELSA-2026-1473.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
openssl-3.5.1-7.0.1.el9_7.x86_64.rpm
openssl-devel-3.5.1-7.0.1.el9_7.i686.rpm
openssl-devel-3.5.1-7.0.1.el9_7.x86_64.rpm
openssl-libs-3.5.1-7.0.1.el9_7.i686.rpm
openssl-libs-3.5.1-7.0.1.el9_7.x86_64.rpm
openssl-perl-3.5.1-7.0.1.el9_7.x86_64.rpm

aarch64:
openssl-3.5.1-7.0.1.el9_7.aarch64.rpm
openssl-devel-3.5.1-7.0.1.el9_7.aarch64.rpm
openssl-libs-3.5.1-7.0.1.el9_7.aarch64.rpm
openssl-perl-3.5.1-7.0.1.el9_7.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/openssl-3.5.1-7.0.1.el9_7.src.rpm

Related CVEs:

CVE-2025-11187
CVE-2025-15467
CVE-2025-15468
CVE-2025-15469
CVE-2025-66199
CVE-2025-68160
CVE-2025-69418
CVE-2025-69419
CVE-2025-69420
CVE-2025-69421
CVE-2026-22795
CVE-2026-22796

Description of changes:

[3.5.1-7.0.1]
- Enable openssl-fips-provider dependency [Orabug: 36504822]
- Temporary disable openssl-fips-provider dependency [Orabug: 36504822]
- Replace upstream references [Orabug: 34340177]

[3.5.1.openela.0.1]
- Add OpenELA specific changes

[1:3.5.1-7]
- Fix CVE-2025-11187 CVE-2025-15467 CVE-2025-15468 CVE-2025-15469
CVE-2025-66199 CVE-2025-68160 CVE-2025-69418 CVE-2025-69419 CVE-2025-69420
CVE-2025-69421 CVE-2026-22795 CVE-2026-22796
Resolves: RHEL-142068
Resolves: RHEL-142002
Resolves: RHEL-142055
Resolves: RHEL-142051
Resolves: RHEL-142047
Resolves: RHEL-142043
Resolves: RHEL-142039
Resolves: RHEL-142035
Resolves: RHEL-142031
Resolves: RHEL-142011
Resolves: RHEL-142027
Resolves: RHEL-142023

[1:3.5.1-6]
- Fix AES/GCM ppc64le encrypt/decrypt
Resolves: RHEL-139131



ELSA-2026-1429 Important: Oracle Linux 9 php:8.3 security update


Oracle Linux Security Advisory ELSA-2026-1429

http://linux.oracle.com/errata/ELSA-2026-1429.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
apcu-panel-5.1.23-1.module+el9.6.0+90525+5083e899.noarch.rpm
php-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-bcmath-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-cli-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-common-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-dba-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-dbg-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-devel-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-embedded-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-enchant-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-ffi-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-fpm-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-gd-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-gmp-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-intl-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-ldap-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-mbstring-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-mysqlnd-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-odbc-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-opcache-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-pdo-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-pecl-apcu-5.1.23-1.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pecl-redis6-6.1.0-2.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pecl-rrd-2.0.3-4.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pecl-xdebug3-3.3.1-1.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pecl-zip-1.22.3-1.module+el9.6.0+90525+5083e899.x86_64.rpm
php-pgsql-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-process-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-snmp-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-soap-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm
php-xml-8.3.29-1.module+el9.7.0+90776+76de6b03.x86_64.rpm

aarch64:
apcu-panel-5.1.23-1.module+el9.6.0+90525+5083e899.noarch.rpm
php-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-bcmath-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-cli-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-common-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-dba-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-dbg-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-devel-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-embedded-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-enchant-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-ffi-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-fpm-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-gd-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-gmp-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-intl-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-ldap-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-mbstring-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-mysqlnd-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-odbc-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-opcache-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-pdo-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-pecl-apcu-5.1.23-1.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pecl-redis6-6.1.0-2.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pecl-rrd-2.0.3-4.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pecl-xdebug3-3.3.1-1.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pecl-zip-1.22.3-1.module+el9.6.0+90525+5083e899.aarch64.rpm
php-pgsql-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-process-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-snmp-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-soap-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm
php-xml-8.3.29-1.module+el9.7.0+90776+76de6b03.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/php-8.3.29-1.module+el9.7.0+90776+76de6b03.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-apcu-5.1.23-1.module+el9.6.0+90525+5083e899.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-redis6-6.1.0-2.module+el9.6.0+90525+5083e899.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-rrd-2.0.3-4.module+el9.6.0+90525+5083e899.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-xdebug3-3.3.1-1.module+el9.6.0+90525+5083e899.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-zip-1.22.3-1.module+el9.6.0+90525+5083e899.src.rpm

Related CVEs:

CVE-2025-14177
CVE-2025-14178
CVE-2025-14180

Description of changes:

php
[8.3.29-1]
- rebase to 8.3.29

php-pecl-apcu
php-pecl-redis6
php-pecl-rrd
php-pecl-xdebug3
php-pecl-zip



ELSA-2026-1409 Important: Oracle Linux 9 php:8.2 security update


Oracle Linux Security Advisory ELSA-2026-1409

http://linux.oracle.com/errata/ELSA-2026-1409.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
apcu-panel-5.1.23-1.module+el9.4.0+90261+af5cc950.noarch.rpm
php-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-bcmath-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-cli-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-common-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-dba-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-dbg-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-devel-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-embedded-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-enchant-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-ffi-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-fpm-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-gd-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-gmp-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-intl-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-ldap-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-mbstring-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-mysqlnd-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-odbc-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-opcache-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-pdo-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-pecl-apcu-5.1.23-1.module+el9.4.0+90261+af5cc950.x86_64.rpm
php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+90261+af5cc950.x86_64.rpm
php-pecl-rrd-2.0.3-4.module+el9.4.0+90261+af5cc950.x86_64.rpm
php-pecl-xdebug3-3.2.2-2.module+el9.4.0+90261+af5cc950.x86_64.rpm
php-pecl-zip-1.22.3-1.module+el9.4.0+90261+af5cc950.x86_64.rpm
php-pgsql-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-process-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-snmp-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-soap-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm
php-xml-8.2.30-1.module+el9.7.0+90777+7055ad44.x86_64.rpm

aarch64:
apcu-panel-5.1.23-1.module+el9.4.0+90261+af5cc950.noarch.rpm
php-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-bcmath-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-cli-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-common-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-dba-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-dbg-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-devel-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-embedded-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-enchant-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-ffi-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-fpm-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-gd-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-gmp-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-intl-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-ldap-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-mbstring-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-mysqlnd-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-odbc-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-opcache-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-pdo-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-pecl-apcu-5.1.23-1.module+el9.4.0+90261+af5cc950.aarch64.rpm
php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+90261+af5cc950.aarch64.rpm
php-pecl-rrd-2.0.3-4.module+el9.4.0+90261+af5cc950.aarch64.rpm
php-pecl-xdebug3-3.2.2-2.module+el9.4.0+90261+af5cc950.aarch64.rpm
php-pecl-zip-1.22.3-1.module+el9.4.0+90261+af5cc950.aarch64.rpm
php-pgsql-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-process-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-snmp-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-soap-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm
php-xml-8.2.30-1.module+el9.7.0+90777+7055ad44.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/php-8.2.30-1.module+el9.7.0+90777+7055ad44.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-apcu-5.1.23-1.module+el9.4.0+90261+af5cc950.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-rrd-2.0.3-4.module+el9.4.0+90261+af5cc950.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-xdebug3-3.2.2-2.module+el9.4.0+90261+af5cc950.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates/php-pecl-zip-1.22.3-1.module+el9.4.0+90261+af5cc950.src.rpm

Related CVEs:

CVE-2025-1220
CVE-2025-1735
CVE-2025-6491
CVE-2025-14177
CVE-2025-14178
CVE-2025-14180

Description of changes:

php
[8.2.30-1]
- rebase to 8.2.30

php-pecl-apcu
php-pecl-rrd
php-pecl-xdebug3
php-pecl-zip



ELSA-2026-50076 Moderate: Oracle Linux 9 image-builder security update


Oracle Linux Security Advisory ELSA-2026-50076

http://linux.oracle.com/errata/ELSA-2026-50076.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
image-builder-45-1.0.2.el9_7.x86_64.rpm

aarch64:
image-builder-45-1.0.2.el9_7.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates/image-builder-45-1.0.2.el9_7.src.rpm

Related CVEs:

CVE-2025-58183

Description of changes:

[45-1.0.2]
- Fix CVE-2025-58183



ELSA-2026-1592 Moderate: Oracle Linux 8 iperf3 security update


Oracle Linux Security Advisory ELSA-2026-1592

http://linux.oracle.com/errata/ELSA-2026-1592.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
iperf3-3.5-12.el8_10.i686.rpm
iperf3-3.5-12.el8_10.x86_64.rpm

aarch64:
iperf3-3.5-12.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/iperf3-3.5-12.el8_10.src.rpm

Related CVEs:

CVE-2025-54349

Description of changes:

[3.5-12]
- Resolves: RHEL-136175 - iperf Heap Buffer Overflow (CVE-2025-54349)



ELSA-2026-1574 Important: Oracle Linux 8 gimp:2.8 security update


Oracle Linux Security Advisory ELSA-2026-1574

http://linux.oracle.com/errata/ELSA-2026-1574.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
gimp-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.x86_64.rpm
gimp-devel-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.x86_64.rpm
gimp-devel-tools-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.x86_64.rpm
gimp-libs-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.x86_64.rpm
pygobject2-2.28.7-5.module+el8.10.0+90497+ae78887f.x86_64.rpm
pygobject2-codegen-2.28.7-5.module+el8.10.0+90497+ae78887f.x86_64.rpm
pygobject2-devel-2.28.7-5.module+el8.10.0+90497+ae78887f.x86_64.rpm
pygobject2-doc-2.28.7-5.module+el8.10.0+90497+ae78887f.x86_64.rpm
pygtk2-2.24.0-25.module+el8.9.0+90151+46a7e4b5.x86_64.rpm
pygtk2-codegen-2.24.0-25.module+el8.9.0+90151+46a7e4b5.x86_64.rpm
pygtk2-devel-2.24.0-25.module+el8.9.0+90151+46a7e4b5.x86_64.rpm
pygtk2-doc-2.24.0-25.module+el8.9.0+90151+46a7e4b5.noarch.rpm
python2-cairo-1.16.3-7.module+el8.10.0+90497+ae78887f.x86_64.rpm
python2-cairo-devel-1.16.3-7.module+el8.10.0+90497+ae78887f.x86_64.rpm

aarch64:
gimp-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.aarch64.rpm
gimp-devel-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.aarch64.rpm
gimp-devel-tools-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.aarch64.rpm
gimp-libs-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.aarch64.rpm
pygobject2-2.28.7-5.module+el8.10.0+90497+ae78887f.aarch64.rpm
pygobject2-codegen-2.28.7-5.module+el8.10.0+90497+ae78887f.aarch64.rpm
pygobject2-devel-2.28.7-5.module+el8.10.0+90497+ae78887f.aarch64.rpm
pygobject2-doc-2.28.7-5.module+el8.10.0+90497+ae78887f.aarch64.rpm
pygtk2-2.24.0-25.module+el8.9.0+90151+46a7e4b5.aarch64.rpm
pygtk2-codegen-2.24.0-25.module+el8.9.0+90151+46a7e4b5.aarch64.rpm
pygtk2-devel-2.24.0-25.module+el8.9.0+90151+46a7e4b5.aarch64.rpm
pygtk2-doc-2.24.0-25.module+el8.9.0+90151+46a7e4b5.noarch.rpm
python2-cairo-1.16.3-7.module+el8.10.0+90497+ae78887f.aarch64.rpm
python2-cairo-devel-1.16.3-7.module+el8.10.0+90497+ae78887f.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/gimp-2.8.22-26.module+el8.10.0+90778+ba4a24eb.4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates/pygobject2-2.28.7-5.module+el8.10.0+90497+ae78887f.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates/pygtk2-2.24.0-25.module+el8.9.0+90151+46a7e4b5.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates/python2-pycairo-1.16.3-7.module+el8.10.0+90497+ae78887f.src.rpm

Related CVEs:

CVE-2025-14422

Description of changes:

gimp
[2:2.8.22-26.4]
- fix CVE-2025-14422

pygobject2
pygtk2
python2-pycairo



ELSA-2026-1518 Important: Oracle Linux 8 grafana-pcp security update


Oracle Linux Security Advisory ELSA-2026-1518

http://linux.oracle.com/errata/ELSA-2026-1518.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
grafana-pcp-5.1.1-11.el8_10.x86_64.rpm

aarch64:
grafana-pcp-5.1.1-11.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/grafana-pcp-5.1.1-11.el8_10.src.rpm

Related CVEs:

CVE-2025-61729

Description of changes:

[5.1.1-11]
- Resolves RHEL-140538: CVE-2025-61729



ELSA-2026-1380 Moderate: Oracle Linux 8 osbuild-composer security update


Oracle Linux Security Advisory ELSA-2026-1380

http://linux.oracle.com/errata/ELSA-2026-1380.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
osbuild-composer-101.4-2.0.1.el8_10.x86_64.rpm
osbuild-composer-core-101.4-2.0.1.el8_10.x86_64.rpm
osbuild-composer-worker-101.4-2.0.1.el8_10.x86_64.rpm

aarch64:
osbuild-composer-101.4-2.0.1.el8_10.aarch64.rpm
osbuild-composer-core-101.4-2.0.1.el8_10.aarch64.rpm
osbuild-composer-worker-101.4-2.0.1.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/osbuild-composer-101.4-2.0.1.el8_10.src.rpm

Related CVEs:

CVE-2025-58183

Description of changes:

[101.4-2.0.1]
- Support using repository definitons with OCI variables [JIRA: OLDIS-38657]
- Update repositories to contain OCI variables
- Remove image types Minimal-raw and wsl [JIRA: OLDIS-38123]
- Increase default /boot size to 1GB [Orabug: 36827079]
- support for building OL8/9 images on Oracle Linux 8 [Orabug: 36400619]

[101.4-2]
- Rebuilt to fix:
- CVE-2025-58183
- RHEL-125669



ELSA-2025-23947 Moderate: Oracle Linux 7 kernel security update


Oracle Linux Security Advisory ELSA-2025-23947

http://linux.oracle.com/errata/ELSA-2025-23947.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.119.1.0.16.el7.noarch.rpm
kernel-debug-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-devel-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-doc-3.10.0-1160.119.1.0.16.el7.noarch.rpm
kernel-headers-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-tools-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
perf-3.10.0-1160.119.1.0.16.el7.x86_64.rpm
python-perf-3.10.0-1160.119.1.0.16.el7.x86_64.rpm

SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-1160.119.1.0.16.el7.src.rpm

Related CVEs:

CVE-2022-50356
CVE-2022-50367
CVE-2022-50403
CVE-2022-50406
CVE-2022-50410
CVE-2023-53178
CVE-2023-53297
CVE-2023-53322
CVE-2025-38729
CVE-2025-39757
CVE-2025-39955

Description of changes:

[3.10.0-1160.119.1.0.16]
- net: sched: sfb: fix null pointer access issue when sfb_init() fails {CVE-2022-50356} [Orabug: 38790244]
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-50367} [Orabug: 38790244]
- iomap: iomap: fix memory corruption when recording {CVE-2022-50406} [Orabug: 38790244]
- mm: fix zswap writeback race condition {CVE-2023-53178} [Orabug: 38790244]
- Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp {CVE-2023-53297} [Orabug: 38790244]
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322} [Orabug: 38790244]
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729} [Orabug: 38790244]
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757} [Orabug: 38790244]
- tcp: fix potential double free issue for fastopen_req [Orabug: 38790244]
- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() {CVE-2025-39955} [Orabug: 38790244]
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-50410} [Orabug: 38790244]
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403} [Orabug: 38790244]

[3.10.0-1160.119.1.0.15]
- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put [Orabug: 38742878]
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} [Orabug: 38742878]
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305} [Orabug: 38742878]
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} [Orabug: 38742878]
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} [Orabug: 38742878]

[3.10.0-1160.119.1.0.14]
- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978} [Orabug: 38644370]
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} [Orabug: 38644370]
- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026} [Orabug: 38644370]
- net_sched: hfsc: Fix a UAF vulnerability in class handling {CVE-2025-37797} [Orabug: 38644370]
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} [Orabug: 38644370]
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} [Orabug: 38644370]

[3.10.0-1160.119.1.0.13]
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701} [Orabug: 38493400]
- md-raid10: fix KASAN warning {CVE-2022-50211} [Orabug: 38493400]
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229} [Orabug: 38493400]
- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125} [Orabug: 38493400]
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200} [Orabug: 38493400]
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477} [Orabug: 38493400]

[3.10.0-1160.119.1.0.12]
- scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) [Orabug: 38414589]
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) [Orabug: 38414589]

[3.10.0-1160.119.1.0.11]
- kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
- kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
- kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
- kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
- kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (CVE-2025-38000)
- kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
- kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)
- kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (CVE-2025-38177)
- kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
- crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)

[3.10.0-1160.119.1.0.10]
- net: atlantic: fix aq_vec index out of range error (Chia-Lin Kao) {CVE-2022-50066} [Orabug: 38201271]
- net: atm: fix use after free in lec_send() (Dan Carpenter) {CVE-2025-22004} [Orabug: 38201271]

[3.10.0-1160.119.1.0.9]
- netfilter: ipset: add missing range check in bitmap_ip_uadt (Jeongjun Park) {CVE-2024-53141} [Orabug: 37964173]
- Update OL SB certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985797]

[3.10.0-1160.119.1.0.8]
- ALSA: usb-audio: Fix out of bounds reads when finding clock sources (Takashi Iwai) {CVE-2024-53150} [Orabug: 37830084]

[3.10.0-1160.119.1.0.7]
- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (Benoît Sevens) {CVE-2024-53197} [Orabug: 37686305]
- can: bcm: Fix UAF in bcm_proc_show() (YueHaibing) {CVE-2023-52922} [Orabug: 37686305]
- HID: core: zero-initialize the report buffer (Benoît Sevens) {CVE-2024-50302} [Orabug: 37686305]



ELSA-2025-22910 Moderate: Oracle Linux 7 kernel security update


Oracle Linux Security Advisory ELSA-2025-22910

http://linux.oracle.com/errata/ELSA-2025-22910.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.119.1.0.15.el7.noarch.rpm
kernel-debug-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-devel-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-doc-3.10.0-1160.119.1.0.15.el7.noarch.rpm
kernel-headers-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-tools-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
perf-3.10.0-1160.119.1.0.15.el7.x86_64.rpm
python-perf-3.10.0-1160.119.1.0.15.el7.x86_64.rpm

SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-1160.119.1.0.15.el7.src.rpm

Related CVEs:

CVE-2022-3640
CVE-2022-50341
CVE-2022-50386
CVE-2022-50408
CVE-2023-53305
CVE-2023-53365
CVE-2025-38718

Description of changes:

[3.10.0-1160.119.1.0.15]
- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put [Orabug: 38742878]
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} [Orabug: 38742878]
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305} [Orabug: 38742878]
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} [Orabug: 38742878]
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} [Orabug: 38742878]

[3.10.0-1160.119.1.0.14]
- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978} [Orabug: 38644370]
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} [Orabug: 38644370]
- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026} [Orabug: 38644370]
- net_sched: hfsc: Fix a UAF vulnerability in class handling {CVE-2025-37797} [Orabug: 38644370]
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} [Orabug: 38644370]
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} [Orabug: 38644370]

[3.10.0-1160.119.1.0.13]
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701} [Orabug: 38493400]
- md-raid10: fix KASAN warning {CVE-2022-50211} [Orabug: 38493400]
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229} [Orabug: 38493400]
- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125} [Orabug: 38493400]
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200} [Orabug: 38493400]
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477} [Orabug: 38493400]

[3.10.0-1160.119.1.0.12]
- scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) [Orabug: 38414589]
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) [Orabug: 38414589]

[3.10.0-1160.119.1.0.11]
- kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
- kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
- kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
- kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
- kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (CVE-2025-38000)
- kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
- kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)
- kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (CVE-2025-38177)
- kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
- crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)

[3.10.0-1160.119.1.0.10]
- net: atlantic: fix aq_vec index out of range error (Chia-Lin Kao) {CVE-2022-50066} [Orabug: 38201271]
- net: atm: fix use after free in lec_send() (Dan Carpenter) {CVE-2025-22004} [Orabug: 38201271]

[3.10.0-1160.119.1.0.9]
- netfilter: ipset: add missing range check in bitmap_ip_uadt (Jeongjun Park) {CVE-2024-53141} [Orabug: 37964173]
- Update OL SB certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985797]

[3.10.0-1160.119.1.0.8]
- ALSA: usb-audio: Fix out of bounds reads when finding clock sources (Takashi Iwai) {CVE-2024-53150} [Orabug: 37830084]

[3.10.0-1160.119.1.0.7]
- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (Benoît Sevens) {CVE-2024-53197} [Orabug: 37686305]
- can: bcm: Fix UAF in bcm_proc_show() (YueHaibing) {CVE-2023-52922} [Orabug: 37686305]
- HID: core: zero-initialize the report buffer (Benoît Sevens) {CVE-2024-50302} [Orabug: 37686305]

[3.10.0-1160.119.1.0.6]
- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (Benoit Sevens) {CVE-2024-53104} [Orabug: 37584712]



ELSA-2026-1696 Moderate: Oracle Linux 10 util-linux security update


Oracle Linux Security Advisory ELSA-2026-1696

http://linux.oracle.com/errata/ELSA-2026-1696.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
libblkid-2.40.2-15.el10_1.x86_64.rpm
libblkid-devel-2.40.2-15.el10_1.x86_64.rpm
libfdisk-2.40.2-15.el10_1.x86_64.rpm
libfdisk-devel-2.40.2-15.el10_1.x86_64.rpm
libmount-2.40.2-15.el10_1.x86_64.rpm
libmount-devel-2.40.2-15.el10_1.x86_64.rpm
libsmartcols-2.40.2-15.el10_1.x86_64.rpm
libsmartcols-devel-2.40.2-15.el10_1.x86_64.rpm
libuuid-2.40.2-15.el10_1.x86_64.rpm
libuuid-devel-2.40.2-15.el10_1.x86_64.rpm
python3-libmount-2.40.2-15.el10_1.x86_64.rpm
util-linux-2.40.2-15.el10_1.x86_64.rpm
util-linux-core-2.40.2-15.el10_1.x86_64.rpm
uuidd-2.40.2-15.el10_1.x86_64.rpm

aarch64:
libblkid-2.40.2-15.el10_1.aarch64.rpm
libblkid-devel-2.40.2-15.el10_1.aarch64.rpm
libfdisk-2.40.2-15.el10_1.aarch64.rpm
libfdisk-devel-2.40.2-15.el10_1.aarch64.rpm
libmount-2.40.2-15.el10_1.aarch64.rpm
libmount-devel-2.40.2-15.el10_1.aarch64.rpm
libsmartcols-2.40.2-15.el10_1.aarch64.rpm
libsmartcols-devel-2.40.2-15.el10_1.aarch64.rpm
libuuid-2.40.2-15.el10_1.aarch64.rpm
libuuid-devel-2.40.2-15.el10_1.aarch64.rpm
python3-libmount-2.40.2-15.el10_1.aarch64.rpm
util-linux-2.40.2-15.el10_1.aarch64.rpm
util-linux-core-2.40.2-15.el10_1.aarch64.rpm
uuidd-2.40.2-15.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/util-linux-2.40.2-15.el10_1.src.rpm

Related CVEs:

CVE-2025-14104

Description of changes:

[2.40.2-15]
- libblkid: use snprintf() instead of sprintf()

[2.40.2-14]
- Fix setpwnam() buffer use [CVE-2025-14104]



ELSA-2026-1714 Moderate: Oracle Linux 10 wireshark security update


Oracle Linux Security Advisory ELSA-2026-1714

http://linux.oracle.com/errata/ELSA-2026-1714.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
wireshark-4.4.2-4.0.1.el10_1.2.x86_64.rpm
wireshark-cli-4.4.2-4.0.1.el10_1.2.x86_64.rpm
wireshark-devel-4.4.2-4.0.1.el10_1.2.x86_64.rpm

aarch64:
wireshark-4.4.2-4.0.1.el10_1.2.aarch64.rpm
wireshark-cli-4.4.2-4.0.1.el10_1.2.aarch64.rpm
wireshark-devel-4.4.2-4.0.1.el10_1.2.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/wireshark-4.4.2-4.0.1.el10_1.2.src.rpm

Related CVEs:

CVE-2025-9817

Description of changes:

[4.4.2-4.0.1.el10_1.2]
- Fix post script to not fail during initial installation [Orabug: 37565359]

[1:4.4.2-4.2]
- Resolves: RHEL-136916 - NULL Pointer Dereference in Wireshark (CVE-2025-9817)

[1:4.4.2-4.1]
- Resolves: RHEL-130425 - Access of Uninitialized Pointer in Wireshark



ELSA-2026-1715 Important: Oracle Linux 10 golang-github-openprinting-ipp-usb security update


Oracle Linux Security Advisory ELSA-2026-1715

http://linux.oracle.com/errata/ELSA-2026-1715.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
ipp-usb-0.9.27-4.el10_1.x86_64.rpm

aarch64:
ipp-usb-0.9.27-4.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/golang-github-openprinting-ipp-usb-0.9.27-4.el10_1.src.rpm

Related CVEs:

CVE-2025-61729

Description of changes:

[0.9.27-4]
- rebuild to fix CVE-2025-61729



ELSA-2026-1628 Important: Oracle Linux 10 php security update


Oracle Linux Security Advisory ELSA-2026-1628

http://linux.oracle.com/errata/ELSA-2026-1628.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
php-8.3.29-1.el10_1.x86_64.rpm
php-bcmath-8.3.29-1.el10_1.x86_64.rpm
php-cli-8.3.29-1.el10_1.x86_64.rpm
php-common-8.3.29-1.el10_1.x86_64.rpm
php-dba-8.3.29-1.el10_1.x86_64.rpm
php-dbg-8.3.29-1.el10_1.x86_64.rpm
php-devel-8.3.29-1.el10_1.x86_64.rpm
php-embedded-8.3.29-1.el10_1.x86_64.rpm
php-enchant-8.3.29-1.el10_1.x86_64.rpm
php-ffi-8.3.29-1.el10_1.x86_64.rpm
php-fpm-8.3.29-1.el10_1.x86_64.rpm
php-gd-8.3.29-1.el10_1.x86_64.rpm
php-gmp-8.3.29-1.el10_1.x86_64.rpm
php-intl-8.3.29-1.el10_1.x86_64.rpm
php-ldap-8.3.29-1.el10_1.x86_64.rpm
php-mbstring-8.3.29-1.el10_1.x86_64.rpm
php-mysqlnd-8.3.29-1.el10_1.x86_64.rpm
php-odbc-8.3.29-1.el10_1.x86_64.rpm
php-opcache-8.3.29-1.el10_1.x86_64.rpm
php-pdo-8.3.29-1.el10_1.x86_64.rpm
php-pgsql-8.3.29-1.el10_1.x86_64.rpm
php-process-8.3.29-1.el10_1.x86_64.rpm
php-snmp-8.3.29-1.el10_1.x86_64.rpm
php-soap-8.3.29-1.el10_1.x86_64.rpm
php-xml-8.3.29-1.el10_1.x86_64.rpm

aarch64:
php-8.3.29-1.el10_1.aarch64.rpm
php-bcmath-8.3.29-1.el10_1.aarch64.rpm
php-cli-8.3.29-1.el10_1.aarch64.rpm
php-common-8.3.29-1.el10_1.aarch64.rpm
php-dba-8.3.29-1.el10_1.aarch64.rpm
php-dbg-8.3.29-1.el10_1.aarch64.rpm
php-devel-8.3.29-1.el10_1.aarch64.rpm
php-embedded-8.3.29-1.el10_1.aarch64.rpm
php-enchant-8.3.29-1.el10_1.aarch64.rpm
php-ffi-8.3.29-1.el10_1.aarch64.rpm
php-fpm-8.3.29-1.el10_1.aarch64.rpm
php-gd-8.3.29-1.el10_1.aarch64.rpm
php-gmp-8.3.29-1.el10_1.aarch64.rpm
php-intl-8.3.29-1.el10_1.aarch64.rpm
php-ldap-8.3.29-1.el10_1.aarch64.rpm
php-mbstring-8.3.29-1.el10_1.aarch64.rpm
php-mysqlnd-8.3.29-1.el10_1.aarch64.rpm
php-odbc-8.3.29-1.el10_1.aarch64.rpm
php-opcache-8.3.29-1.el10_1.aarch64.rpm
php-pdo-8.3.29-1.el10_1.aarch64.rpm
php-pgsql-8.3.29-1.el10_1.aarch64.rpm
php-process-8.3.29-1.el10_1.aarch64.rpm
php-snmp-8.3.29-1.el10_1.aarch64.rpm
php-soap-8.3.29-1.el10_1.aarch64.rpm
php-xml-8.3.29-1.el10_1.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/php-8.3.29-1.el10_1.src.rpm

Related CVEs:

CVE-2025-14177
CVE-2025-14178
CVE-2025-14180

Description of changes:

[8.3.29-1]
- rebase to 8.3.29