[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2025-20470)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Jul 28 06:48:58 UTC 2025
Synopsis: ELSA-2025-20470 can now be patched using Ksplice
CVEs: CVE-2022-49168 CVE-2023-52572 CVE-2023-52752 CVE-2024-26686 CVE-2024-
26739 CVE-2024-35866 CVE-2024-35867 CVE-2024-38540 CVE-2024-49960 CVE-2024-
50047 CVE-2024-50272 CVE-2024-53185 CVE-2024-56551 CVE-2024-56658 CVE-2024-
57996 CVE-2025-23145 CVE-2025-23150 CVE-2025-23163 CVE-2025-37738 CVE-2025-
37749 CVE-2025-37752 CVE-2025-37756 CVE-2025-37757 CVE-2025-37773 CVE-2025-
37780 CVE-2025-37789 CVE-2025-37797 CVE-2025-37808 CVE-2025-37824 CVE-2025-
37844 CVE-2025-37890 CVE-2025-37892 CVE-2025-37911 CVE-2025-37913 CVE-2025-
37914 CVE-2025-37915 CVE-2025-37992 CVE-2025-38089
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20470.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20470.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2022-49168: Use-after-free in Btrfs filesystem driver.
* CVE-2023-52572: Use-after-free in CIFS driver.
* CVE-2023-52752: Use-after-free in CIFS driver.
* CVE-2024-26686: Hard lockup in /proc filesystem driver.
Orabug: 38081922
* CVE-2024-26739: Memory corruption in Redirecting and Mirroring driver.
* CVE-2024-35866: Use-after-free in CIFS driver.
* CVE-2024-35867: Use-after-free in CIFS driver.
* CVE-2024-38540: Data corruption in Broadcom Netxtreme HCA driver.
* CVE-2024-49960: Use-after-free in ext4 filesystem driver.
* CVE-2024-50047, CVE-2024-53185: Use-after-free in CIFS driver.
* CVE-2024-50272: Infinite loop in memory management subsystem.
* CVE-2024-56551: Privilege escalation in AMD GPU driver.
* CVE-2024-56658: Memory corruption in Network namespace subsystem.
* CVE-2024-57996, CVE-2025-37752: Out-of-bounds memory access in Stochastic
Fairness Queueing (SFQ) driver.
* CVE-2025-23145: Null pointer dereference in Multipath TCP driver.
* CVE-2025-23150: Out-of-bounds memory access in ext4 filesystem driver.
* CVE-2025-23163: Deadlock in 802.1Q/802.1ad VLAN Support.
* CVE-2025-37738: Use-after-free in ext4 filesystem driver.
* CVE-2025-37749: Information leak in PPP driver.
* CVE-2025-37756: Undefined behaviour in Transport Layer Security driver.
* CVE-2025-37757: Memory leak in the TIPC Protocol driver.
* CVE-2025-37773: Null pointer dereference in FUSE virtio filesystem.
* CVE-2025-37780: Out-of-bounds memory access in ISO file system.
* CVE-2025-37789: Out-of-bounds memory access in Open vSwitch.
* CVE-2025-37797: Use-after-free in HFSC network scheduler.
* CVE-2025-37808: Use-after-free in Crypto Null algorithms.
* CVE-2025-37824: Null pointer dereference in TIPC Protocol driver.
* CVE-2025-37844: Null pointer dereference in CIFS driver.
* CVE-2025-37890: Use-after-free in HFSC network scheduler.
* CVE-2025-37892: Use of uninitialized memory in Memory Technology Device (MTD)
driver.
* CVE-2025-37911: Out-of-bounds memory access in Broadcom NetXtreme-C/E driver.
* CVE-2025-37913, CVE-2025-37914, CVE-2025-37915: Memory corruption in multiple
network scheduler drivers.
* CVE-2025-37992: Null pointer dereference in Fair Queue driver.
* CVE-2025-38089: Kernel crash in SUNRPC subsystem.
* Invalid locking in MMU-based Paged Memory Management driver.
Orabug: 37734242
* Invalid wchan field in ps output.
Orabug: 38212634
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-26952, CVE-2024-27402, CVE-2024-35943, CVE-2024-36908,
CVE-2024-42160, CVE-2024-44938, CVE-2024-46742, CVE-2024-46774,
CVE-2024-54458, CVE-2025-23140, CVE-2025-23146, CVE-2025-23147,
CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37758, CVE-2025-37790, CVE-2025-37803, CVE-2025-37812,
CVE-2025-37817, CVE-2025-37829, CVE-2025-37830, CVE-2025-37838,
CVE-2025-37840, CVE-2025-37841, CVE-2025-37850, CVE-2025-37851,
CVE-2025-37858, CVE-2025-37881, CVE-2025-37883, CVE-2025-37905,
CVE-2025-37909, CVE-2025-37969, CVE-2025-37970, CVE-2025-37991,
CVE-2025-38005
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list