[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2025-25757)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Fri Nov 14 12:09:04 UTC 2025


Synopsis: ELSA-2025-25757 can now be patched using Ksplice
CVEs: CVE-2023-52935 CVE-2024-26652 CVE-2025-38468 CVE-2025-38473 CVE-2025-38477 CVE-2025-38527 CVE-2025-38550 CVE-2025-38572 CVE-2025-38617 CVE-2025-38639 CVE-2025-38664 CVE-2025-38684 CVE-2025-38685 CVE-2025-38708 CVE-2025-38718 CVE-2025-38732 CVE-2025-39673 CVE-2025-39691 CVE-2025-39697 CVE-2025-39703 CVE-2025-39730 CVE-2025-39756 CVE-2025-39782 CVE-2025-39790 CVE-2025-39798 CVE-2025-39841 CVE-2025-39860

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-25757.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-25757.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-52935: Use-after-free in Transparent Hugepage driver.

* CVE-2024-26652: Double free in AMD/Pensando Data Systems Core Device driver.

Orabug: 36530186


* CVE-2025-38468: Kernel oops in Hierarchical Token Bucket network scheduler.

* CVE-2025-38473: Null pointer dereference in Bluetooth subsystem.

* CVE-2025-38477: Use-after-free in Quick Fair Queueing scheduler (QFQ) driver.

* CVE-2025-38527: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38550: Use-after-free in multicast support for IPv6 driver.

* CVE-2025-38572: Out-of-bounds memory access in IPv6 networking stack.

* CVE-2025-38617: Racing in raw-packet protocol stack.

* CVE-2025-38639: Out-of-bounds memory access in Netfilter driver.

* CVE-2025-38664: Null pointer dereference in Intel(R) Ethernet Connection E800 Series driver.

* CVE-2025-38684: Null pointer dereference in Packet Scheduler subsystem.

* CVE-2025-38685: Out-of-bounds memory access in frame buffer device driver.

* CVE-2025-38708: Remote use-after-free in Distributed Replicated Block Device driver.

* CVE-2025-38718: Use of uninitialized memory in SCTP Protocol driver.

* CVE-2025-38732: Memory leak in IPv6 packet rejection driver.

* CVE-2025-39673: Kernel panic in PPP (point-to-point protocol) driver.

* CVE-2025-39691: Use-after-free in core filesystem layer.

* CVE-2025-39697: Use-after-free in NFS client driver.

* CVE-2025-39703: Kernel panic in High-availability Seamless Redundancy (HSR & PRP) driver.

* CVE-2025-39730: Out-of-bounds memory access in NFS client driver.

* CVE-2025-39756: Kernel assertion failure in core filesystem layer.

* CVE-2025-39782: Soft lockup in JBD2 filesystem.

* CVE-2025-39790: Double free in Modem Host Interface (MHI) bus subsystem.

* CVE-2025-39798: Overly permissive capabilities in NFS client driver.

* CVE-2025-39841: Use-after-free in Emulex LightPulse Fibre Channel driver.

* CVE-2025-39860: Remote use-after-free in Bluetooth subsystem.

* Interrupt delivery issues in Kernel-based Virtual Machine (KVM) support.

Orabug: 38458436


* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2025-37925, CVE-2025-38347, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38529, CVE-2025-38530, CVE-2025-38538, CVE-2025-38548,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38583, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630,
CVE-2025-38634, CVE-2025-38635, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38663, CVE-2025-38666, CVE-2025-38677, CVE-2025-38681,
CVE-2025-38687, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38707, CVE-2025-38711, CVE-2025-38712, CVE-2025-38713,
CVE-2025-38714, CVE-2025-38715, CVE-2025-39675, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39687, CVE-2025-39702, CVE-2025-39710,
CVE-2025-39734, CVE-2025-39736, CVE-2025-39737, CVE-2025-39743,
CVE-2025-39752, CVE-2025-39776, CVE-2025-39783, CVE-2025-39788,
CVE-2025-39794, CVE-2025-39839, CVE-2025-39846, CVE-2025-39848,
CVE-2025-39920


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the El-errata mailing list