[El-errata] Fwd: New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2025-20521)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Aug 13 12:33:36 UTC 2025


Synopsis: ELSA-2025-20521 can now be patched using Ksplice
CVEs: CVE-2023-6931 CVE-2025-37798 CVE-2025-37890 CVE-2025-37913 CVE-2025-37915 CVE-2025-37932 CVE-2025-37953 CVE-2025-38000 CVE-2025-38001 CVE-2025-38035 CVE-2025-38037 CVE-2025-38051 CVE-2025-38075 CVE-2025-38079 CVE-2025-38177 CVE-2025-38350

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20521.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20521.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-6931: Privilege escalation in Kernel Performance Events.

Orabug: 36261486


* CVE-2025-37798, CVE-2025-38177, CVE-2025-37932, CVE-2025-37953: Use-after-free in Fair-Queue Controlled-Delay packet scheduler.

* CVE-2025-37890, CVE-2025-38000, CVE-2025-38001, CVE-2025-38350: Use-after-free in HFSC network scheduler.

* CVE-2025-37913, CVE-2025-37915: Memory corruption in multiple network scheduler drivers.

* CVE-2025-38035: Null pointer dereference in NVMe Target subsystem.

* CVE-2025-38037: Racing in Virtual eXtensible Local Area Network (VXLAN) driver.

* CVE-2025-38051: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38075: Null pointer dereference in iSCSI Target Mode Stack driver.

* CVE-2025-38079: Use-after-free in hash algorithms interface layer.

* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2025-37969, CVE-2025-37970, CVE-2025-37991, CVE-2025-38065,
CVE-2025-37909


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part
URL: <http://oss.oracle.com/pipermail/el-errata/attachments/20250813/5cef6981/attachment-0001.sig>


More information about the El-errata mailing list