[El-errata] New Ksplice updates for UEKR8 6.12.0 on OL9 and OL10 (ELSA-2025-28040)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Tue Jan 6 10:19:33 UTC 2026


Synopsis: ELSA-2025-28040 can now be patched using Ksplice
CVEs: CVE-2025-22117 CVE-2025-40018 CVE-2025-40027 CVE-2025-40031 CVE-2025-40038 CVE-2025-40040 CVE-2025-40044 CVE-2025-40047 CVE-2025-40055 CVE-2025-40061 CVE-2025-40080 CVE-2025-40087 CVE-2025-40099 CVE-2025-40103 CVE-2025-40105 CVE-2025-40129 CVE-2025-40133 CVE-2025-40141 CVE-2025-40153 CVE-2025-40173 CVE-2025-40178 CVE-2025-40186 CVE-2025-40187 CVE-2025-40194 CVE-2025-40195 CVE-2025-40201 CVE-2025-40204 CVE-2025-40205 CVE-2025-40206

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-28040.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-28040.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR8 6.12.0 on
OL9 and OL10 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2025-22117: Out-of-bounds memory access in PCI IOV driver.

Orabug: 37844696


* CVE-2025-40018: Use-after-free in IP virtual server (FTP) driver.

* CVE-2025-40027: Use-after-free in 9P protocol stack.

* CVE-2025-40031: Null pointer dereference in Trusted Execution Environment driver.

* CVE-2025-40038: Kernel assertion failure in KVM.

* CVE-2025-40040: Kernel panic in KSM for page merging driver.

* CVE-2025-40044: Out-of-bounds memory access in UDF filesystem.

* CVE-2025-40047: Use-after-free in iouring support.

* CVE-2025-40055: Use-after-free in OCFS2 filesystem.

* CVE-2025-40061: Use-after-free in Software RDMA over Ethernet (RoCE) driver.

* CVE-2025-40080: Undefined behavior in Network block device driver.

* CVE-2025-40087: Remote null pointer dereference in Parallel NFS FlexFile server driver.

* CVE-2025-40099: Out-of-bounds memory access in SMB/CIFS client driver.

* CVE-2025-40103: Reference count leak in SMB/CIFS client driver.

* CVE-2025-40105: Memory leak in Virtual File System.

* CVE-2025-40129: Null pointer dereference in SUNRPC_GSS.

* CVE-2025-40133: Use-after-free in Multipath TCP driver.

* CVE-2025-40141: Use-after-free in Bluetooth Low Energy (LE) features driver.

* CVE-2025-40153: Soft lockup in HugeTLB filesystem.

* CVE-2025-40173: Use-after-free in IPv6 networking stack.

* CVE-2025-40178: Null pointer dereference in core kernel.

* CVE-2025-40186: Use-after-free in TCP/IP networking driver.

* CVE-2025-40187: Null pointer dereference in SCTP Protocol driver.

* CVE-2025-40194: Kernel crash in Intel P state control driver.

* CVE-2025-40195: Null pointer dereference in namespace support.

* CVE-2025-40201: Use-after-free in prlimit64 syscall.

* CVE-2025-40204: Variable-time MAC check in SCTP Protocol driver.

* CVE-2025-40205: Out-of-bounds memory access in BTRFS filesystem.

* CVE-2025-40206: Kernel crash in Netfilter driver.

* Logic error in Transport Layer Security driver.

* Use of uninitialized memory in Transport Layer Security driver.

* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2025-39995, CVE-2025-40003, CVE-2025-40004, CVE-2025-40028,
CVE-2025-40029, CVE-2025-40033, CVE-2025-40036, CVE-2025-40037,
CVE-2025-40039, CVE-2025-40043, CVE-2025-40045, CVE-2025-40059,
CVE-2025-40060, CVE-2025-40062, CVE-2025-40067, CVE-2025-40068,
CVE-2025-40079, CVE-2025-40088, CVE-2025-40090, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40107,
CVE-2025-40112, CVE-2025-40116, CVE-2025-40124, CVE-2025-40126,
CVE-2025-40127, CVE-2025-40137, CVE-2025-40155, CVE-2025-40156,
CVE-2025-40172, CVE-2025-40177, CVE-2025-40188, CVE-2025-40193,
CVE-2025-40221


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list