[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2025-20716)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Oct 16 09:53:12 UTC 2025


Synopsis: ELSA-2025-20716 can now be patched using Ksplice
CVEs: CVE-2022-48703 CVE-2023-32233 CVE-2023-3390 CVE-2023-3777 CVE-2024-26775 CVE-2025-21920 CVE-2025-38236 CVE-2025-38445 CVE-2025-38461 CVE-2025-38462 CVE-2025-38464 CVE-2025-38466 CVE-2025-38488 CVE-2025-38569 CVE-2025-39866

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-20716.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-20716.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-48703: Null pointer dereference in ACPI INT340X thermal drivers driver.

* CVE-2024-26775: Deadlock in ATA over Ethernet (AoE) subsystem.

* CVE-2025-38236: Out-of-bounds memory access in Unix domain sockets driver.

Orabug: 38528187


* CVE-2025-38445: Kernel panic in RAID-1 (mirroring) mode driver.

* CVE-2025-38461: Denial-of-service in Virtual Socket protocol driver.

* CVE-2025-38462: Null pointer dereference in Virtual Socket protocol driver.

* CVE-2025-38464: Use-after-free in TIPC Protocol driver.

* CVE-2025-38466: Overly permissive privilege checks in Kernel performance events and counters driver.

* CVE-2025-38488: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38569: Kernel oops in BladeEngine NIC driver.

* CVE-2025-39866: Use-after-free in writeback filesystem logic.

Orabug: 38528183


* Logic error in L3 stats handling in rtnetlink subsystem.

Orabug: 38511910


* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2024-44939, CVE-2025-38514, CVE-2025-38542


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the El-errata mailing list