Synopsis: ELSA-2025-20551 can now be patched using Ksplice CVEs: CVE-2018-3646 CVE-2025-22115 CVE-2025-37984 CVE-2025-38139 CVE-2025-38375 CVE-2025-38382 CVE-2025-38387 CVE-2025-38396 CVE-2025-38399 CVE-2025-38412 CVE-2025-38413 CVE-2025-38445 CVE-2025-38457 CVE-2025-38461 CVE-2025-38462 CVE-2025-38463 CVE-2025-38464 CVE-2025-38466 CVE-2025-38468 CVE-2025-38471 CVE-2025-38472 CVE-2025-38473 CVE-2025-38477 CVE-2025-38488 CVE-2025-38494 CVE-2025-38495 CVE-2025-38499 CVE-2025-38511 CVE-2025-38512 CVE-2025-38527 CVE-2025-38550
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-20551. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-20551.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR8 6.12.0 on OL9 and OL10 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2025-22115: Use-after-free in Btrfs filesystem driver. * CVE-2025-37984: Integer overflow in Crypto ECC driver. * CVE-2025-38139: Out-of-bounds memory access in NetFS driver. * CVE-2025-38375: Out-of-bounds memory access in Virtio network driver. * CVE-2025-38382: Out-of-bounds memory access in Btrfs filesystem driver. * CVE-2025-38387: Null pointer dereference in Mellanox MLX5 InfiniBand driver. * CVE-2025-38396: Information leak in memfd_secret syscall. * CVE-2025-38399: Null pointer dereference in Generic Target Core Mod (TCM) and ConfigFS Infrastructure driver. * CVE-2025-38412: Kernel crash in Dell WMI-based Systems management driver. * CVE-2025-38413: Out-of-bounds memory access in Virtio network driver. * CVE-2025-38445: Kernel panic in RAID-1 (mirroring) mode driver. * CVE-2025-38457: Null pointer dereference in QoS and/or fair queueing driver. * CVE-2025-38461: Denial-of-service in Virtual Socket protocol driver. * CVE-2025-38462: Null pointer dereference in Virtual Socket protocol driver. * CVE-2025-38463: Integer overflow in TCP/IP networking driver. * CVE-2025-38464: Use-after-free in TIPC Protocol driver. * CVE-2025-38466: Data corruption in Kernel performance events and counters driver. * CVE-2025-38468: Kernel oops in Hierarchical Token Bucket network scheduler. * CVE-2025-38471: Use-after-free in Transport Layer Security driver. * CVE-2025-38472: Kernel crash in Netfilter driver. * CVE-2025-38473: Null pointer dereference in Bluetooth subsystem. * CVE-2025-38477: Use-after-free in Quick Fair Queueing scheduler (QFQ) driver. * CVE-2025-38488: Use-after-free in SMB/CIFS client driver. * CVE-2025-38494, CVE-2025-38495: Out-of-bounds memory access in HID bus driver. * CVE-2025-38499: Overly permissive privilege checks in Virtual File System. * CVE-2025-38511: Missing memory clearing in Intel XE driver. * CVE-2025-38512: Missing check for A-MSDU attacks in Wireless driver. * CVE-2025-38527: Use-after-free in SMB/CIFS client driver. * CVE-2025-38550: Use-after-free in multicast support for IPv6 driver. * Improved fix for CVE-2018-3646: L1 Terminal Fault Reloaded. * Information leak on x86 CPUs (VMScape). Orabug: 38343659 * Note: Oracle has determined some CVEs are not applicable. The kernel is not affected by the following CVEs since the code under consideration is not compiled. CVE-2025-38371, CVE-2025-38376, CVE-2025-38377, CVE-2025-38381, CVE-2025-38384, CVE-2025-38390, CVE-2025-38401, CVE-2025-38407, CVE-2025-38408, CVE-2025-38437, CVE-2025-38446, CVE-2025-38452, CVE-2025-38454, CVE-2025-38469, CVE-2025-38475, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38485, CVE-2025-38489, CVE-2025-38490, CVE-2025-38507, CVE-2025-38510, CVE-2025-38517, CVE-2025-38521, CVE-2025-38529, CVE-2025-38530, CVE-2025-38532, CVE-2025-38533, CVE-2025-38538, CVE-2025-38542, CVE-2025-38545, CVE-2025-38548 SUPPORT Ksplice support is available at [email protected]. _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
