Synopsis: ELSA-2025-20470 can now be patched using Ksplice CVEs: CVE-2022-49168 CVE-2023-52572 CVE-2023-52752 CVE-2024-26686 CVE-2024- 26739 CVE-2024-35866 CVE-2024-35867 CVE-2024-38540 CVE-2024-49960 CVE-2024- 50047 CVE-2024-50272 CVE-2024-53185 CVE-2024-56551 CVE-2024-56658 CVE-2024- 57996 CVE-2025-23145 CVE-2025-23150 CVE-2025-23163 CVE-2025-37738 CVE-2025- 37749 CVE-2025-37752 CVE-2025-37756 CVE-2025-37757 CVE-2025-37773 CVE-2025- 37780 CVE-2025-37789 CVE-2025-37797 CVE-2025-37808 CVE-2025-37824 CVE-2025- 37844 CVE-2025-37890 CVE-2025-37892 CVE-2025-37911 CVE-2025-37913 CVE-2025- 37914 CVE-2025-37915 CVE-2025-37992 CVE-2025-38089
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-20470. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-20470.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on OL8 and OL9 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2022-49168: Use-after-free in Btrfs filesystem driver. * CVE-2023-52572: Use-after-free in CIFS driver. * CVE-2023-52752: Use-after-free in CIFS driver. * CVE-2024-26686: Hard lockup in /proc filesystem driver. Orabug: 38081922 * CVE-2024-26739: Memory corruption in Redirecting and Mirroring driver. * CVE-2024-35866: Use-after-free in CIFS driver. * CVE-2024-35867: Use-after-free in CIFS driver. * CVE-2024-38540: Data corruption in Broadcom Netxtreme HCA driver. * CVE-2024-49960: Use-after-free in ext4 filesystem driver. * CVE-2024-50047, CVE-2024-53185: Use-after-free in CIFS driver. * CVE-2024-50272: Infinite loop in memory management subsystem. * CVE-2024-56551: Privilege escalation in AMD GPU driver. * CVE-2024-56658: Memory corruption in Network namespace subsystem. * CVE-2024-57996, CVE-2025-37752: Out-of-bounds memory access in Stochastic Fairness Queueing (SFQ) driver. * CVE-2025-23145: Null pointer dereference in Multipath TCP driver. * CVE-2025-23150: Out-of-bounds memory access in ext4 filesystem driver. * CVE-2025-23163: Deadlock in 802.1Q/802.1ad VLAN Support. * CVE-2025-37738: Use-after-free in ext4 filesystem driver. * CVE-2025-37749: Information leak in PPP driver. * CVE-2025-37756: Undefined behaviour in Transport Layer Security driver. * CVE-2025-37757: Memory leak in the TIPC Protocol driver. * CVE-2025-37773: Null pointer dereference in FUSE virtio filesystem. * CVE-2025-37780: Out-of-bounds memory access in ISO file system. * CVE-2025-37789: Out-of-bounds memory access in Open vSwitch. * CVE-2025-37797: Use-after-free in HFSC network scheduler. * CVE-2025-37808: Use-after-free in Crypto Null algorithms. * CVE-2025-37824: Null pointer dereference in TIPC Protocol driver. * CVE-2025-37844: Null pointer dereference in CIFS driver. * CVE-2025-37890: Use-after-free in HFSC network scheduler. * CVE-2025-37892: Use of uninitialized memory in Memory Technology Device (MTD) driver. * CVE-2025-37911: Out-of-bounds memory access in Broadcom NetXtreme-C/E driver. * CVE-2025-37913, CVE-2025-37914, CVE-2025-37915: Memory corruption in multiple network scheduler drivers. * CVE-2025-37992: Null pointer dereference in Fair Queue driver. * CVE-2025-38089: Kernel crash in SUNRPC subsystem. * Invalid locking in MMU-based Paged Memory Management driver. Orabug: 37734242 * Invalid wchan field in ps output. Orabug: 38212634 * Note: Oracle has determined some CVEs are not applicable. The kernel is not affected by the following CVEs since the code under consideration is not compiled. CVE-2024-26952, CVE-2024-27402, CVE-2024-35943, CVE-2024-36908, CVE-2024-42160, CVE-2024-44938, CVE-2024-46742, CVE-2024-46774, CVE-2024-54458, CVE-2025-23140, CVE-2025-23146, CVE-2025-23147, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742, CVE-2025-37758, CVE-2025-37790, CVE-2025-37803, CVE-2025-37812, CVE-2025-37817, CVE-2025-37829, CVE-2025-37830, CVE-2025-37838, CVE-2025-37840, CVE-2025-37841, CVE-2025-37850, CVE-2025-37851, CVE-2025-37858, CVE-2025-37881, CVE-2025-37883, CVE-2025-37905, CVE-2025-37909, CVE-2025-37969, CVE-2025-37970, CVE-2025-37991, CVE-2025-38005 SUPPORT Ksplice support is available at [email protected]. _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
