Synopsis: ELSA-2025-12746 can now be patched using Ksplice CVEs: CVE-2022-49788 CVE-2025-21727 CVE-2025-21962 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38087 CVE-2025-38177 CVE-2025-38197 CVE-2025-38273
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2025-12746. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2025-12746.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running RHCK 9 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2022-49788: Information leak in VMware VMCI driver. * CVE-2025-21727: Privilege escalation in PADATA. * CVE-2025-21962: Integer overflow in SMB3/CIFS driver. * CVE-2025-38052, CVE-2025-38273: Use-after-free in TIPC encryption driver. * CVE-2025-38087: Use-after-free in Time Aware Priority (taprio) Scheduler driver. * CVE-2025-38177, CVE-2025-37890, CVE-2025-38000, CVE-2025-38001: Use-after-free in HFSC network scheduler. * CVE-2025-38197: Null pointer dereference in BIOS update driver for DELL systems. SUPPORT Ksplice support is available at ksplice-support...@oracle.com. _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata