[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2025-25757)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Fri Nov 14 12:09:04 UTC 2025
Synopsis: ELSA-2025-25757 can now be patched using Ksplice
CVEs: CVE-2023-52935 CVE-2024-26652 CVE-2025-38468 CVE-2025-38473 CVE-2025-38477 CVE-2025-38527 CVE-2025-38550 CVE-2025-38572 CVE-2025-38617 CVE-2025-38639 CVE-2025-38664 CVE-2025-38684 CVE-2025-38685 CVE-2025-38708 CVE-2025-38718 CVE-2025-38732 CVE-2025-39673 CVE-2025-39691 CVE-2025-39697 CVE-2025-39703 CVE-2025-39730 CVE-2025-39756 CVE-2025-39782 CVE-2025-39790 CVE-2025-39798 CVE-2025-39841 CVE-2025-39860
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-25757.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-25757.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-52935: Use-after-free in Transparent Hugepage driver.
* CVE-2024-26652: Double free in AMD/Pensando Data Systems Core Device driver.
Orabug: 36530186
* CVE-2025-38468: Kernel oops in Hierarchical Token Bucket network scheduler.
* CVE-2025-38473: Null pointer dereference in Bluetooth subsystem.
* CVE-2025-38477: Use-after-free in Quick Fair Queueing scheduler (QFQ) driver.
* CVE-2025-38527: Use-after-free in SMB/CIFS client driver.
* CVE-2025-38550: Use-after-free in multicast support for IPv6 driver.
* CVE-2025-38572: Out-of-bounds memory access in IPv6 networking stack.
* CVE-2025-38617: Racing in raw-packet protocol stack.
* CVE-2025-38639: Out-of-bounds memory access in Netfilter driver.
* CVE-2025-38664: Null pointer dereference in Intel(R) Ethernet Connection E800 Series driver.
* CVE-2025-38684: Null pointer dereference in Packet Scheduler subsystem.
* CVE-2025-38685: Out-of-bounds memory access in frame buffer device driver.
* CVE-2025-38708: Remote use-after-free in Distributed Replicated Block Device driver.
* CVE-2025-38718: Use of uninitialized memory in SCTP Protocol driver.
* CVE-2025-38732: Memory leak in IPv6 packet rejection driver.
* CVE-2025-39673: Kernel panic in PPP (point-to-point protocol) driver.
* CVE-2025-39691: Use-after-free in core filesystem layer.
* CVE-2025-39697: Use-after-free in NFS client driver.
* CVE-2025-39703: Kernel panic in High-availability Seamless Redundancy (HSR & PRP) driver.
* CVE-2025-39730: Out-of-bounds memory access in NFS client driver.
* CVE-2025-39756: Kernel assertion failure in core filesystem layer.
* CVE-2025-39782: Soft lockup in JBD2 filesystem.
* CVE-2025-39790: Double free in Modem Host Interface (MHI) bus subsystem.
* CVE-2025-39798: Overly permissive capabilities in NFS client driver.
* CVE-2025-39841: Use-after-free in Emulex LightPulse Fibre Channel driver.
* CVE-2025-39860: Remote use-after-free in Bluetooth subsystem.
* Interrupt delivery issues in Kernel-based Virtual Machine (KVM) support.
Orabug: 38458436
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2025-37925, CVE-2025-38347, CVE-2025-38476, CVE-2025-38478,
CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483,
CVE-2025-38529, CVE-2025-38530, CVE-2025-38538, CVE-2025-38548,
CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581,
CVE-2025-38583, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630,
CVE-2025-38634, CVE-2025-38635, CVE-2025-38650, CVE-2025-38652,
CVE-2025-38663, CVE-2025-38666, CVE-2025-38677, CVE-2025-38681,
CVE-2025-38687, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698,
CVE-2025-38707, CVE-2025-38711, CVE-2025-38712, CVE-2025-38713,
CVE-2025-38714, CVE-2025-38715, CVE-2025-39675, CVE-2025-39684,
CVE-2025-39685, CVE-2025-39687, CVE-2025-39702, CVE-2025-39710,
CVE-2025-39734, CVE-2025-39736, CVE-2025-39737, CVE-2025-39743,
CVE-2025-39752, CVE-2025-39776, CVE-2025-39783, CVE-2025-39788,
CVE-2025-39794, CVE-2025-39839, CVE-2025-39846, CVE-2025-39848,
CVE-2025-39920
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list