Synopsis: ELSA-2025-25757 can now be patched using Ksplice CVEs: CVE-2023-52935 CVE-2024-26652 CVE-2025-38468 CVE-2025-38473 CVE-2025-38477 CVE-2025-38527 CVE-2025-38550 CVE-2025-38572 CVE-2025-38617 CVE-2025-38639 CVE-2025-38664 CVE-2025-38684 CVE-2025-38685 CVE-2025-38708 CVE-2025-38718 CVE-2025-38732 CVE-2025-39673 CVE-2025-39691 CVE-2025-39697 CVE-2025-39703 CVE-2025-39730 CVE-2025-39756 CVE-2025-39782 CVE-2025-39790 CVE-2025-39798 CVE-2025-39841 CVE-2025-39860
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-25757. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-25757.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on OL8 and OL9 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2023-52935: Use-after-free in Transparent Hugepage driver. * CVE-2024-26652: Double free in AMD/Pensando Data Systems Core Device driver. Orabug: 36530186 * CVE-2025-38468: Kernel oops in Hierarchical Token Bucket network scheduler. * CVE-2025-38473: Null pointer dereference in Bluetooth subsystem. * CVE-2025-38477: Use-after-free in Quick Fair Queueing scheduler (QFQ) driver. * CVE-2025-38527: Use-after-free in SMB/CIFS client driver. * CVE-2025-38550: Use-after-free in multicast support for IPv6 driver. * CVE-2025-38572: Out-of-bounds memory access in IPv6 networking stack. * CVE-2025-38617: Racing in raw-packet protocol stack. * CVE-2025-38639: Out-of-bounds memory access in Netfilter driver. * CVE-2025-38664: Null pointer dereference in Intel(R) Ethernet Connection E800 Series driver. * CVE-2025-38684: Null pointer dereference in Packet Scheduler subsystem. * CVE-2025-38685: Out-of-bounds memory access in frame buffer device driver. * CVE-2025-38708: Remote use-after-free in Distributed Replicated Block Device driver. * CVE-2025-38718: Use of uninitialized memory in SCTP Protocol driver. * CVE-2025-38732: Memory leak in IPv6 packet rejection driver. * CVE-2025-39673: Kernel panic in PPP (point-to-point protocol) driver. * CVE-2025-39691: Use-after-free in core filesystem layer. * CVE-2025-39697: Use-after-free in NFS client driver. * CVE-2025-39703: Kernel panic in High-availability Seamless Redundancy (HSR & PRP) driver. * CVE-2025-39730: Out-of-bounds memory access in NFS client driver. * CVE-2025-39756: Kernel assertion failure in core filesystem layer. * CVE-2025-39782: Soft lockup in JBD2 filesystem. * CVE-2025-39790: Double free in Modem Host Interface (MHI) bus subsystem. * CVE-2025-39798: Overly permissive capabilities in NFS client driver. * CVE-2025-39841: Use-after-free in Emulex LightPulse Fibre Channel driver. * CVE-2025-39860: Remote use-after-free in Bluetooth subsystem. * Interrupt delivery issues in Kernel-based Virtual Machine (KVM) support. Orabug: 38458436 * Note: Oracle has determined some CVEs are not applicable. The kernel is not affected by the following CVEs since the code under consideration is not compiled. CVE-2025-37925, CVE-2025-38347, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38529, CVE-2025-38530, CVE-2025-38538, CVE-2025-38548, CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38583, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630, CVE-2025-38634, CVE-2025-38635, CVE-2025-38650, CVE-2025-38652, CVE-2025-38663, CVE-2025-38666, CVE-2025-38677, CVE-2025-38681, CVE-2025-38687, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698, CVE-2025-38707, CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715, CVE-2025-39675, CVE-2025-39684, CVE-2025-39685, CVE-2025-39687, CVE-2025-39702, CVE-2025-39710, CVE-2025-39734, CVE-2025-39736, CVE-2025-39737, CVE-2025-39743, CVE-2025-39752, CVE-2025-39776, CVE-2025-39783, CVE-2025-39788, CVE-2025-39794, CVE-2025-39839, CVE-2025-39846, CVE-2025-39848, CVE-2025-39920 SUPPORT Ksplice support is available at [email protected]. _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
