[El-errata] New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2025-20471)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Jul 21 04:49:31 UTC 2025
Synopsis: ELSA-2025-20471 can now be patched using Ksplice
CVEs: CVE-2021-47352 CVE-2025-23150 CVE-2025-23163 CVE-2025-37738 CVE-2025-37749 CVE-2025-37757 CVE-2025-37780 CVE-2025-37789 CVE-2025-37797 CVE-2025-37808 CVE-2025-37824 CVE-2025-37892
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20471.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20471.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-47352: Denial-of-service in Virtio network driver.
* CVE-2025-23150: Out-of-bounds memory access in ext4 filesystem driver.
* CVE-2025-23163: Deadlock in 802.1Q/802.1ad VLAN Support.
* CVE-2025-37738: Use-after-free in ext4 filesystem driver.
* CVE-2025-37749: Information leak in PPP driver.
* CVE-2025-37757: Memory leak in the TIPC Protocol driver.
* CVE-2025-37780: Out-of-bounds memory access in ISO file system.
* CVE-2025-37789: Out-of-bounds memory access in Open vSwitch.
* CVE-2025-37797: Use-after-free in HFSC network scheduler.
* CVE-2025-37808: Use-after-free in Crypto Null algorithms.
* CVE-2025-37824: Null pointer dereference in TIPC Protocol driver.
* CVE-2025-37892: Use of uninitialized memory in Memory Technology Device (MTD) driver.
* Slow user-pages get in RDS Protocol driver.
Using _fast() API to locklessly get user pages will improve
performance.
Orabug: 37973441
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-28956, CVE-2025-23140, CVE-2025-23147, CVE-2025-23157,
CVE-2025-23158, CVE-2025-23159, CVE-2025-37740, CVE-2025-37741,
CVE-2025-37758, CVE-2025-37773, CVE-2025-37803, CVE-2025-37812,
CVE-2025-37817, CVE-2025-37829, CVE-2025-37838, CVE-2025-37840,
CVE-2025-37841, CVE-2025-37850, CVE-2025-37851, CVE-2025-37858,
CVE-2025-37881
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part
URL: <http://oss.oracle.com/pipermail/el-errata/attachments/20250721/6683e189/attachment.sig>
More information about the El-errata
mailing list