[El-errata] New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2025-20153)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Mar 13 05:39:34 UTC 2025
Synopsis: ELSA-2025-20153 can now be patched using Ksplice
CVEs: CVE-2024-53164
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20153.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20153.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2024-53164: Privilege escalation in CAKE network scheduler.
A logic error when using the Common Applications Kept Enhanced (CAKE)
network scheduler could lead to a use-after-free. A local attacker could
use this flaw to escalate privileges.
* Remote denial-of-service in NFSv4.1 client driver.
A missing check when using the NFSv4.1 client driver could lead
to a livelock. A remote attacker could use this flaw to cause a
denial-of-service.
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-53690, CVE-2024-56767, CVE-2024-57802, CVE-2024-57889,
CVE-2024-57900
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part
URL: <http://oss.oracle.com/pipermail/el-errata/attachments/20250313/d355bff3/attachment.sig>
More information about the El-errata
mailing list