Synopsis: ELSA-2025-20521 can now be patched using Ksplice CVEs: CVE-2023-6931 CVE-2025-37798 CVE-2025-37890 CVE-2025-37913 CVE-2025-37915 CVE-2025-37932 CVE-2025-37953 CVE-2025-38000 CVE-2025-38001 CVE-2025-38035 CVE-2025-38037 CVE-2025-38051 CVE-2025-38075 CVE-2025-38079 CVE-2025-38177 CVE-2025-38350
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-20521. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-20521.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on OL7 and OL8 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2023-6931: Privilege escalation in Kernel Performance Events. Orabug: 36261486 * CVE-2025-37798, CVE-2025-38177, CVE-2025-37932, CVE-2025-37953: Use-after-free in Fair-Queue Controlled-Delay packet scheduler. * CVE-2025-37890, CVE-2025-38000, CVE-2025-38001, CVE-2025-38350: Use-after-free in HFSC network scheduler. * CVE-2025-37913, CVE-2025-37915: Memory corruption in multiple network scheduler drivers. * CVE-2025-38035: Null pointer dereference in NVMe Target subsystem. * CVE-2025-38037: Racing in Virtual eXtensible Local Area Network (VXLAN) driver. * CVE-2025-38051: Use-after-free in SMB/CIFS client driver. * CVE-2025-38075: Null pointer dereference in iSCSI Target Mode Stack driver. * CVE-2025-38079: Use-after-free in hash algorithms interface layer. * Note: Oracle has determined some CVEs are not applicable. The kernel is not affected by the following CVEs since the code under consideration is not compiled. CVE-2025-37969, CVE-2025-37970, CVE-2025-37991, CVE-2025-38065, CVE-2025-37909 SUPPORT Ksplice support is available at [email protected].
signature.asc
Description: This is a digitally signed message part
_______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
