[El-errata] New Ksplice updates for UEKR8 6.12.0 on OL9 and OL10 (ELSA-2025-20480)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Oct 1 09:29:47 UTC 2025


Synopsis: ELSA-2025-20480 can now be patched using Ksplice
CVEs: CVE-2018-3646 CVE-2025-23155 CVE-2025-37953 CVE-2025-37954 CVE-2025-37961 CVE-2025-37992 CVE-2025-38000 CVE-2025-38001 CVE-2025-38018 CVE-2025-38020 CVE-2025-38022 CVE-2025-38035 CVE-2025-38051 CVE-2025-38058 CVE-2025-38068 CVE-2025-38073 CVE-2025-38075 CVE-2025-38079 CVE-2025-38083 CVE-2025-38084 CVE-2025-38085 CVE-2025-38086 CVE-2025-38087 CVE-2025-38089 CVE-2025-38097 CVE-2025-38107 CVE-2025-38108 CVE-2025-38109 CVE-2025-38110 CVE-2025-38111 CVE-2025-38112 CVE-2025-38115 CVE-2025-38120 CVE-2025-38124 CVE-2025-38146 CVE-2025-38147 CVE-2025-38154 CVE-2025-38184 CVE-2025-38190 CVE-2025-38193 CVE-2025-38194 CVE-2025-38197 CVE-2025-38208 CVE-2025-38211 CVE-2025-38212 CVE-2025-38220 CVE-2025-38222 CVE-2025-38231 CVE-2025-38236 CVE-2025-38245 CVE-2025-38251 CVE-2025-38263 CVE-2025-38264 CVE-2025-38305 CVE-2025-38310 CVE-2025-38328 CVE-2025-38332 CVE-2025-38334 CVE-2025-38342 CVE-2025-38350 CVE-2025-38352 CVE-2025-38364 CVE-2025-38417 CVE-2025-38430 CVE-2025-38498

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20480.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20480.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR8 6.12.0 on
OL9 and OL10 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2025-23155: Out-of-bounds memory access in STMicroelectronics Multi-Gigabit Ethernet driver.

* CVE-2025-37953: Null pointer dereference in Hierarchical Token Bucket (HTB) driver.

* CVE-2025-37954: Memory leak in SMB/CIFS client driver.

* CVE-2025-37961: Use of uninitialized memory in IP virtual server driver.

* CVE-2025-37992: Null pointer dereference in Fair Queue driver.

* CVE-2025-38000: Use-after-free in Hierarchical Fair Service Curve (HFSC) driver.

* CVE-2025-38001: Use-after-free in HFSC network scheduler.

* CVE-2025-38018: Null pointer dereference in Transport Layer Security driver.

* CVE-2025-38020: Null pointer dereference in Mellanox 5th generation network adapters (ConnectX series) Ethernet driver.

* CVE-2025-38022: Use-after-free in InfiniBand driver.

* CVE-2025-38035: Null pointer dereference in NVMe Target subsystem.

* CVE-2025-38051: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38058: Reference count leak in namespace management code.

* CVE-2025-38068: Out-of-bounds memory access in LZO compression algorithm driver.

* CVE-2025-38073: Kernel crash in Zoned block device driver.

* CVE-2025-38075: Null pointer dereference in iSCSI Target Mode Stack driver.

* CVE-2025-38079: Use-after-free in hash algorithms interface layer.

* CVE-2025-38083, CVE-2025-38108: Integer underflow in multiple network schedulers.

* CVE-2025-38084, CVE-2025-38085: Race condition in Transparent Hugepage driver.

* CVE-2025-38086: Use of uninitialized memory in QingHeng CH9200 USB ethernet driver.

* CVE-2025-38087: Use-after-free in Time Aware Priority (taprio) Scheduler driver.

* CVE-2025-38089: Kernel crash in SUNRPC subsystem.

Orabug: 38178286


* CVE-2025-38097: Reference count leak in XFRM.

* CVE-2025-38107: Integer overflow in Enhanced transmission selection scheduler (ETS).

* CVE-2025-38109: Use-after-free in Mellanox Technologies MLX5 SRIOV E-Switch driver.

* CVE-2025-38110: Out-of-bounds memory access in MDIO Bus interface.

* CVE-2025-38111: Out-of-bounds memory usage in MDIO bus driver.

* CVE-2025-38112: Null pointer dereference in TCP/IP networking driver.

* CVE-2025-38115: Null-pointer dereference in Stochastic Fairness Queueing (SFQ) network scheduler.

* CVE-2025-38120: Memory disclosure in Netfilter driver.

* CVE-2025-38124: Kernel oops in TCP/IP networking driver.

* CVE-2025-38146: Soft lockup in Open vSwitch driver.

* CVE-2025-38147: Null-pointer dereference in NetLabel subsystem.

* CVE-2025-38154: Kernel panic in Networking driver.

* CVE-2025-38184: Null-pointer dereference in TIPC IP/UDP driver.

* CVE-2025-38190: Memory leak in ATM networking stack.

* CVE-2025-38193: Integer overflow in Stochastic Fairness Queueing (SFQ) driver.

* CVE-2025-38194, CVE-2025-38328: Logic error in Journalling Flash File System v2 (JFFS2) driver.

* CVE-2025-38197: Null pointer dereference in BIOS update driver for DELL systems.

* CVE-2025-38208: Null pointer dereference in SMB/CIFS client driver.

* CVE-2025-38211: Use-after-free in InfiniBand driver.

* CVE-2025-38212: Use-after-free in System V IPC driver.

* CVE-2025-38220: Null pointer dereference in ext4 filesystem driver.

* CVE-2025-38222: Integer overflow in ext4 filesystem.

* CVE-2025-38231: Null pointer dereference in NFS server driver.

* CVE-2025-38236: Out-of-bounds memory access in Unix domain sockets driver.

* CVE-2025-38245: Race condition in ATM networking stack.

* CVE-2025-38251: Kernel crash in Classical IP over ATM driver.

* CVE-2025-38263: Null pointer dereference in Block device as cache driver.

* CVE-2025-38264: Kernel crash in NVM Express over Fabrics TCP driver.

* CVE-2025-38305: Deadlock in Precision Time Protocol (PTP) driver.

* CVE-2025-38310: Out-of-bounds memory access in IPv6 Segment Routing Header encapsulation driver.

* CVE-2025-38332: Kernel panic in Emulex LightPulse Fibre Channel driver.

* CVE-2025-38334: Kernel panic in Software Guard eXtensions (SGX) driver.

* CVE-2025-38342: Out-of-bounds memory access in software node component.

* CVE-2025-38350: Use-after-free in Packet Scheduler subsystem.

Orabug: 38217337


* CVE-2025-38352: Missing check in POSIX clock/timer driver.

* CVE-2025-38364: Null pointer dereference in Maple Tree implementation.

* CVE-2025-38417: Memory leak in Switchdev driver.

* CVE-2025-38430: Remote kernel crash in NFSv4 server driver.

* CVE-2025-38498: Logic error in core filesystem layer.

* Improved fix for CVE-2018-3646: L1 Terminal Fault Reloaded.

* Information leak on x86 CPUs (VMScape).

Orabug: 38343659


* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2025-22102, CVE-2025-22123, CVE-2025-37947, CVE-2025-37951,
CVE-2025-37952, CVE-2025-37956, CVE-2025-37962, CVE-2025-37969,
CVE-2025-37970, CVE-2025-37971, CVE-2025-37972, CVE-2025-37999,
CVE-2025-38005, CVE-2025-38016, CVE-2025-38019, CVE-2025-38027,
CVE-2025-38033, CVE-2025-38043, CVE-2025-38054, CVE-2025-38065,
CVE-2025-38069, CVE-2025-38082, CVE-2025-38092


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list