Synopsis: ELSA-2025-15011 can now be patched using Ksplice CVEs: CVE-2025-37798 CVE-2025-37823 CVE-2025-37953 CVE-2025-38107 CVE-2025-38211 CVE-2025-38350 CVE-2025-38457 CVE-2025-38461 CVE-2025-38464 CVE-2025-38500 CVE-2025-38684
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-15011. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-15011.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running RHCK 9 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2025-37798: Use-after-free in Fair Queue Controlled Delay (CODEL) driver. * CVE-2025-37823: Use-after-free in Hierarchical Fair Service Curve (HFSC) driver. * CVE-2025-37953: Null pointer dereference in Hierarchical Token Bucket (HTB) driver. * CVE-2025-38107: Integer overflow in Enhanced transmission selection scheduler (ETS). * CVE-2025-38211: Use-after-free in InfiniBand driver. * CVE-2025-38457: Null pointer dereference in QoS and/or fair queueing driver. * CVE-2025-38461: Denial-of-service in Virtual Socket protocol driver. * CVE-2025-38464: Use-after-free in TIPC Protocol driver. * CVE-2025-38500: Use-after-free in Transformation virtual interface driver. * CVE-2025-38684, CVE-2025-38350: Use-after-free in Packet Scheduler subsystem. SUPPORT Ksplice support is available at [email protected]. _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
