[El-errata] New Ksplice updates for UEKR8 6.12.0 on OL9 and OL10 (ELSA-2025-28040)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue Jan 6 10:19:33 UTC 2026
Synopsis: ELSA-2025-28040 can now be patched using Ksplice
CVEs: CVE-2025-22117 CVE-2025-40018 CVE-2025-40027 CVE-2025-40031 CVE-2025-40038 CVE-2025-40040 CVE-2025-40044 CVE-2025-40047 CVE-2025-40055 CVE-2025-40061 CVE-2025-40080 CVE-2025-40087 CVE-2025-40099 CVE-2025-40103 CVE-2025-40105 CVE-2025-40129 CVE-2025-40133 CVE-2025-40141 CVE-2025-40153 CVE-2025-40173 CVE-2025-40178 CVE-2025-40186 CVE-2025-40187 CVE-2025-40194 CVE-2025-40195 CVE-2025-40201 CVE-2025-40204 CVE-2025-40205 CVE-2025-40206
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-28040.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-28040.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR8 6.12.0 on
OL9 and OL10 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2025-22117: Out-of-bounds memory access in PCI IOV driver.
Orabug: 37844696
* CVE-2025-40018: Use-after-free in IP virtual server (FTP) driver.
* CVE-2025-40027: Use-after-free in 9P protocol stack.
* CVE-2025-40031: Null pointer dereference in Trusted Execution Environment driver.
* CVE-2025-40038: Kernel assertion failure in KVM.
* CVE-2025-40040: Kernel panic in KSM for page merging driver.
* CVE-2025-40044: Out-of-bounds memory access in UDF filesystem.
* CVE-2025-40047: Use-after-free in iouring support.
* CVE-2025-40055: Use-after-free in OCFS2 filesystem.
* CVE-2025-40061: Use-after-free in Software RDMA over Ethernet (RoCE) driver.
* CVE-2025-40080: Undefined behavior in Network block device driver.
* CVE-2025-40087: Remote null pointer dereference in Parallel NFS FlexFile server driver.
* CVE-2025-40099: Out-of-bounds memory access in SMB/CIFS client driver.
* CVE-2025-40103: Reference count leak in SMB/CIFS client driver.
* CVE-2025-40105: Memory leak in Virtual File System.
* CVE-2025-40129: Null pointer dereference in SUNRPC_GSS.
* CVE-2025-40133: Use-after-free in Multipath TCP driver.
* CVE-2025-40141: Use-after-free in Bluetooth Low Energy (LE) features driver.
* CVE-2025-40153: Soft lockup in HugeTLB filesystem.
* CVE-2025-40173: Use-after-free in IPv6 networking stack.
* CVE-2025-40178: Null pointer dereference in core kernel.
* CVE-2025-40186: Use-after-free in TCP/IP networking driver.
* CVE-2025-40187: Null pointer dereference in SCTP Protocol driver.
* CVE-2025-40194: Kernel crash in Intel P state control driver.
* CVE-2025-40195: Null pointer dereference in namespace support.
* CVE-2025-40201: Use-after-free in prlimit64 syscall.
* CVE-2025-40204: Variable-time MAC check in SCTP Protocol driver.
* CVE-2025-40205: Out-of-bounds memory access in BTRFS filesystem.
* CVE-2025-40206: Kernel crash in Netfilter driver.
* Logic error in Transport Layer Security driver.
* Use of uninitialized memory in Transport Layer Security driver.
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2025-39995, CVE-2025-40003, CVE-2025-40004, CVE-2025-40028,
CVE-2025-40029, CVE-2025-40033, CVE-2025-40036, CVE-2025-40037,
CVE-2025-40039, CVE-2025-40043, CVE-2025-40045, CVE-2025-40059,
CVE-2025-40060, CVE-2025-40062, CVE-2025-40067, CVE-2025-40068,
CVE-2025-40079, CVE-2025-40088, CVE-2025-40090, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40107,
CVE-2025-40112, CVE-2025-40116, CVE-2025-40124, CVE-2025-40126,
CVE-2025-40127, CVE-2025-40137, CVE-2025-40155, CVE-2025-40156,
CVE-2025-40172, CVE-2025-40177, CVE-2025-40188, CVE-2025-40193,
CVE-2025-40221
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list