[Ksplice][Ubuntu-22.04-Updates] New Ksplice updates for Ubuntu 22.04 Jammy (USN-7909-1)

Oracle Ksplice gregory.herrero at oracle.com
Fri Jan 16 19:55:52 UTC 2026


Synopsis: USN-7909-1 can now be patched using Ksplice
CVEs: CVE-2023-52935 CVE-2025-38468 CVE-2025-38473 CVE-2025-38488 CVE-2025-38494 CVE-2025-38495 CVE-2025-38499 CVE-2025-38527 CVE-2025-38550 CVE-2025-38569 CVE-2025-38572 CVE-2025-38622 CVE-2025-38639 CVE-2025-38664 CVE-2025-38666 CVE-2025-38678 CVE-2025-38684 CVE-2025-38685 CVE-2025-38718 CVE-2025-38724 CVE-2025-38732 CVE-2025-39673 CVE-2025-39691 CVE-2025-39697 CVE-2025-39702 CVE-2025-39703 CVE-2025-39730 CVE-2025-39756 CVE-2025-39782 CVE-2025-39790 CVE-2025-39798 CVE-2025-39823 CVE-2025-39841 CVE-2025-39860 CVE-2025-39866

Systems running Ubuntu 22.04 Jammy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-7909-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 22.04
Jammy install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-52935: Use-after-free in Transparent Hugepage driver.

* CVE-2025-38468: Kernel oops in Hierarchical Token Bucket network scheduler.

* CVE-2025-38473: Null pointer dereference in Bluetooth subsystem.

* CVE-2025-38488: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38494, CVE-2025-38495: Out-of-bounds memory access in HID bus driver.

* CVE-2025-38499: Overly permissive privilege checks in Virtual File System.

* CVE-2025-38527: Use-after-free in SMB/CIFS client driver.

* CVE-2025-38550: Use-after-free in multicast support for IPv6 driver.

* CVE-2025-38569: Kernel oops in BladeEngine NIC driver.

* CVE-2025-38572: Out-of-bounds memory access in IPv6 networking stack.

* CVE-2025-38622: Kernel oops in UDP networking stack.

* CVE-2025-38639: Out-of-bounds memory access in Netfilter driver.

* CVE-2025-38664: Null pointer dereference in Intel(R) Ethernet Connection E800 Series driver.

* CVE-2025-38666: Use-after-free in AppleTalk protocol driver.

* CVE-2025-38678: Denial-of-service in Netfilter driver.

* CVE-2025-38684: Null pointer dereference in ETS network scheduler.

* CVE-2025-38685: Out-of-bounds memory access in frame buffer device driver.

* CVE-2025-38718: Use of uninitialized memory in SCTP Protocol driver.

* CVE-2025-38724: Use-after-free in NFSv4 server driver.

* CVE-2025-38732: Memory leak in Netfilter packet rejection driver.

* CVE-2025-39673: Kernel panic in PPP (point-to-point protocol) driver.

* CVE-2025-39691: Use-after-free in core filesystem layer.

* CVE-2025-39697: Use-after-free in NFS client driver.

* CVE-2025-39702: Observable timing discrepancy in IPv6 Segment Routing HMAC driver.

* CVE-2025-39703: Kernel panic in High-availability Seamless Redundancy (HSR & PRP) driver.

* CVE-2025-39730: Out-of-bounds memory access in NFS client driver.

* CVE-2025-39756: Kernel assertion failure in core filesystem layer.

* CVE-2025-39782: Soft lockup in JBD2 filesystem.

* CVE-2025-39790: Double free in Modem Host Interface (MHI) bus subsystem.

* CVE-2025-39798: Overly permissive capabilities in NFS client driver.

* CVE-2025-39823: Out-of-bounds access in the KVM subsystem.

* CVE-2025-39841: Use-after-free in Emulex LightPulse Fibre Channel driver.

* CVE-2025-39860: Use-after-free in Bluetooth subsystem.

* CVE-2025-39866: Use-after-free in writeback filesystem logic.

* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2024-53068, CVE-2025-38476, CVE-2025-38535, CVE-2025-38538,
CVE-2025-38581, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630,
CVE-2025-38634, CVE-2025-38635, CVE-2025-38670, CVE-2025-38671,
CVE-2025-38696, CVE-2025-39710, CVE-2025-39736, CVE-2025-39737,
CVE-2025-39752, CVE-2025-39772, CVE-2025-39776, CVE-2025-39787,
CVE-2025-39788, CVE-2025-39794, CVE-2025-39846, CVE-2025-38487,
CVE-2025-38576, CVE-2025-39709


SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-22.04-updates mailing list