ELSA-2026-1581

ELSA-2026-1581 - kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2026-03-04

Description


[3.10.0-1160.119.1.0.18]
- e1000e: fix heap overflow in e1000_set_eeprom {CVE-2025-39898} [Orabug: 38904071]
- i40e: fix idx validation in config queues msg {CVE-2025-39971} [Orabug: 38904071]
- vsock: track pkt owner vsock [Orabug: 38904071]
- vhost-vsock: add pkt cancel capability [Orabug: 38904071]
- vsock: cancel packets when failing to connect [Orabug: 38904071]
- vsock: notify server to shutdown when client has pending
signal [Orabug: 38904071]
- vsock: remove vsock from connected table when connect is
interrupted by a signal [Orabug: 38904071]
- vsock: Ignore signal/timeout on connect() if already
established {CVE-2025-40248} [Orabug: 38904071]

[3.10.0-1160.119.1.0.17]
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675} [Orabug: 38860426]
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-53705} [Orabug: 38860426]
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823} [Orabug: 38860426]
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285} [Orabug: 38860426]

[3.10.0-1160.119.1.0.16]
- net: sched: sfb: fix null pointer access issue when sfb_init() fails {CVE-2022-50356} [Orabug: 38790244]
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-50367} [Orabug: 38790244]
- iomap: iomap: fix memory corruption when recording {CVE-2022-50406} [Orabug: 38790244]
- mm: fix zswap writeback race condition {CVE-2023-53178} [Orabug: 38790244]
- Bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp {CVE-2023-53297} [Orabug: 38790244]
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322} [Orabug: 38790244]
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729} [Orabug: 38790244]
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757} [Orabug: 38790244]
- tcp: fix potential double free issue for fastopen_req [Orabug: 38790244]
- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() {CVE-2025-39955} [Orabug: 38790244]
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-50410} [Orabug: 38790244]
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403} [Orabug: 38790244]

[3.10.0-1160.119.1.0.15]
- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put [Orabug: 38742878]
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} [Orabug: 38742878]
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} [Orabug: 38742878]
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305} [Orabug: 38742878]
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} [Orabug: 38742878]
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} [Orabug: 38742878]

[3.10.0-1160.119.1.0.14]
- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978} [Orabug: 38644370]
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} [Orabug: 38644370]
- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026} [Orabug: 38644370]
- net_sched: hfsc: Fix a UAF vulnerability in class handling {CVE-2025-37797} [Orabug: 38644370]
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} [Orabug: 38644370]
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} [Orabug: 38644370]

[3.10.0-1160.119.1.0.13]
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701} [Orabug: 38493400]
- md-raid10: fix KASAN warning {CVE-2022-50211} [Orabug: 38493400]
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229} [Orabug: 38493400]
- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125} [Orabug: 38493400]
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200} [Orabug: 38493400]
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477} [Orabug: 38493400]

[3.10.0-1160.119.1.0.12]
- scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) [Orabug: 38414589]
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) [Orabug: 38414589]

[3.10.0-1160.119.1.0.11]
- kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
- kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
- kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
- kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
- kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (CVE-2025-38000)
- kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
- kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)
- kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (CVE-2025-38177)
- kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
- crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)

[3.10.0-1160.119.1.0.10]
- net: atlantic: fix aq_vec index out of range error (Chia-Lin Kao) {CVE-2022-50066} [Orabug: 38201271]
- net: atm: fix use after free in lec_send() (Dan Carpenter) {CVE-2025-22004} [Orabug: 38201271]

[3.10.0-1160.119.1.0.9]
- netfilter: ipset: add missing range check in bitmap_ip_uadt (Jeongjun Park) {CVE-2024-53141} [Orabug: 37964173]
- Update OL SB certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985797]


Related CVEs


CVE-2025-39898
CVE-2025-39971
CVE-2025-40248

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-3.10.0-1160.119.1.0.18.el7.src.rpma84e50e038e0e5cbfe5650890cf8d280a3eef299c790f5b7af5106c07e5816cb-ol7_x86_64_latest_ELS
bpftool-3.10.0-1160.119.1.0.18.el7.x86_64.rpm4cbbda2c384ce78db4f2f0ef98c4f12f7c9780e692762a4ae3a002f1ae1300ba-ol7_x86_64_latest_ELS
kernel-3.10.0-1160.119.1.0.18.el7.x86_64.rpm066031781b58aeeccb5ec881a823ed2e0d76ff6f7c98dad1e8870fd98c9054d1-ol7_x86_64_latest_ELS
kernel-abi-whitelists-3.10.0-1160.119.1.0.18.el7.noarch.rpmfd401431e2f4eaa6c80ed8f84bc1f209265dd1b64a64df1848f8eff98c8a9bba-ol7_x86_64_latest_ELS
kernel-debug-3.10.0-1160.119.1.0.18.el7.x86_64.rpm5b75a48a638c1eaf32315f9e862914c0b0345e067eb962f7dd3ba41529fea5ef-ol7_x86_64_latest_ELS
kernel-debug-devel-3.10.0-1160.119.1.0.18.el7.x86_64.rpmdc4474b193ce5bf6ca31c9f5fcdd0c01649e7f6896a98db97d237643d00c8286-ol7_x86_64_latest_ELS
kernel-devel-3.10.0-1160.119.1.0.18.el7.x86_64.rpmb924a45f54e97255991824b4ed9f5d00642d56cf70286f172149be69ff3162ad-ol7_x86_64_latest_ELS
kernel-doc-3.10.0-1160.119.1.0.18.el7.noarch.rpm8cb2b8396b42b161a511c9d766cd59ad0b0fcb63dd7d8b0a71c146f7b3a38538-ol7_x86_64_latest_ELS
kernel-headers-3.10.0-1160.119.1.0.18.el7.x86_64.rpme781258e692130c5596b52b664e35d9e16b87eda23f6b52603f04c473070f388-ol7_x86_64_latest_ELS
kernel-tools-3.10.0-1160.119.1.0.18.el7.x86_64.rpmabacb60e8a3a57671421de2dbeb521409be6c72299315a5a55ba6a51b5a2f3e1-ol7_x86_64_latest_ELS
kernel-tools-libs-3.10.0-1160.119.1.0.18.el7.x86_64.rpm7255aed15e4c493c25cb0968f0de47540b81b81b40315e48e24f368fa26f2d98-ol7_x86_64_latest_ELS
kernel-tools-libs-devel-3.10.0-1160.119.1.0.18.el7.x86_64.rpmda87d504d6ce1065df90a3a86d1953ca2768fc328a82f326d18202ac28766496-ol7_x86_64_latest_ELS
perf-3.10.0-1160.119.1.0.18.el7.x86_64.rpmb584feecfab27524c401d6a62a19bc71d738dd7a0339d53a7378a220d47ab5b5-ol7_x86_64_latest_ELS
python-perf-3.10.0-1160.119.1.0.18.el7.x86_64.rpm0896a617adacded692d72eb2faedbd22a42ec7283d2d09ddd39edb38e8fdbcab-ol7_x86_64_latest_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete