Synopsis: ELSA-2025-12746 can now be patched using Ksplice
CVEs: CVE-2022-49788 CVE-2025-21727 CVE-2025-21962 CVE-2025-37890 
CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38087 CVE-2025-38177 
CVE-2025-38197 CVE-2025-38273

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2025-12746.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2025-12746.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 9 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-49788: Information leak in VMware VMCI driver.

* CVE-2025-21727: Privilege escalation in PADATA.

* CVE-2025-21962: Integer overflow in SMB3/CIFS driver.

* CVE-2025-38052, CVE-2025-38273: Use-after-free in TIPC encryption driver.

* CVE-2025-38087: Use-after-free in Time Aware Priority (taprio) Scheduler 
driver.

* CVE-2025-38177, CVE-2025-37890, CVE-2025-38000, CVE-2025-38001: 
Use-after-free in HFSC network scheduler.

* CVE-2025-38197: Null pointer dereference in BIOS update driver for DELL 
systems.

SUPPORT

Ksplice support is available at ksplice-support...@oracle.com.



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Reply via email to