Synopsis: 6.12.0-100.28.2 can now be patched using Ksplice CVEs: CVE-2018-3646 CVE-2025-22126 CVE-2025-23145 CVE-2025-23150 CVE-2025-23163 CVE-2025-37738 CVE-2025-37749 CVE-2025-37750 CVE-2025-37752 CVE-2025-37756 CVE-2025-37757 CVE-2025-37773 CVE-2025-37774 CVE-2025-37780 CVE-2025-37789 CVE-2025-37791 CVE-2025-37797 CVE-2025-37798 CVE-2025-37799 CVE-2025-37808 CVE-2025-37814 CVE-2025-37820 CVE-2025-37824 CVE-2025-37844 CVE-2025-37856 CVE-2025-37879 CVE-2025-37887 CVE-2025-37890 CVE-2025-37892 CVE-2025-37894 CVE-2025-37911 CVE-2025-37913 CVE-2025-37914 CVE-2025-37915 CVE-2025-37921 CVE-2025-37932 CVE-2025-37978 CVE-2025-37988
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle kernel update, 6.12.0-100.28.2. INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR8 6.12.0 on OL9 and OL10 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2025-22126: Use-after-free in Multiple devices (RAID and LVM) driver. * CVE-2025-23145: Null pointer dereference in Multipath TCP driver. * CVE-2025-23150: Out-of-bounds memory access in ext4 filesystem driver. * CVE-2025-23163: Deadlock in 802.1Q/802.1ad VLAN Support. * CVE-2025-37738: Use-after-free in ext4 filesystem driver. * CVE-2025-37749: Information leak in PPP driver. * CVE-2025-37750: Use-after-free in SMB client filesystem driver. * CVE-2025-37752: Out-of-bounds memory access in Stochastic Fairness Queueing (SFQ) driver. * CVE-2025-37756: Undefined behaviour in Transport Layer Security driver. * CVE-2025-37756: Undefined behaviour in Transport Layer Security driver. * CVE-2025-37757: Memory leak in the TIPC Protocol driver. * CVE-2025-37773: Null pointer dereference in FUSE virtio filesystem. * CVE-2025-37774: Null pointer dereference in slab allocator. * CVE-2025-37780: Out-of-bounds memory access in ISO file system. * CVE-2025-37789: Out-of-bounds memory access in Open vSwitch. * CVE-2025-37791: Out-of-bounds memory access in Netlink interface for ethtool. * CVE-2025-37797: Use-after-free in HFSC network scheduler. * CVE-2025-37798, CVE-2025-37932: Use-after-free in Fair Queue Controlled Delay (CODEL) and Hierarchical Token Bucket (HTB) drivers. * CVE-2025-37799: Out-of-bounds memory access in VMware VMXNET3 ethernet driver. * CVE-2025-37808: Use-after-free in Crypto Null algorithms. * CVE-2025-37814: Overly permissive privilege checks in Virtual terminal. * CVE-2025-37820: Null pointer dereference in Xen network device frontend. * CVE-2025-37824: Null pointer dereference in TIPC Protocol driver. * CVE-2025-37844: Null pointer dereference in CIFS driver. * CVE-2025-37856: Use-after-free in Btrfs filesystem driver. * CVE-2025-37879: Null pointer dereference in Plan 9 Resource Sharing. * CVE-2025-37887: Out-of-bounds memory access in AMD Pensando Data Systems driver. * CVE-2025-37890: Use-after-free in HFSC network scheduler. * CVE-2025-37892: Use of uninitialized memory in Memory Technology Device (MTD) driver. * CVE-2025-37894: Invalid pointer dereference in TCP/IP networking. * CVE-2025-37911: Out-of-bounds memory access in Broadcom NetXtreme-C/E driver. * CVE-2025-37913, CVE-2025-37914, CVE-2025-37915: Memory corruption in multiple network scheduler drivers. * CVE-2025-37921: Deadlock in Virtual eXtensible Local Area Network (VXLAN) driver. * CVE-2025-37978: Kernel oops in Block layer data integrity driver. * CVE-2025-37988: Use-after-free in filesystem support. * Improved fix for CVE-2018-3646: L1 Terminal Fault Reloaded. * Note: Oracle has determined some CVEs are not applicable. The kernel is not affected by the following CVEs since the code under consideration is not compiled. CVE-2025-23140, CVE-2025-23144, CVE-2025-23146, CVE-2025-23147, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159, CVE-2025-23162, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742, CVE-2025-37744, CVE-2025-37748, CVE-2025-37755, CVE-2025-37758, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764, CVE-2025-37775, CVE-2025-37776, CVE-2025-37778, CVE-2025-37790, CVE-2025-37801, CVE-2025-37802, CVE-2025-37806, CVE-2025-37810, CVE-2025-37812, CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37818, CVE-2025-37822, CVE-2025-37829, CVE-2025-37830, CVE-2025-37831, CVE-2025-37837, CVE-2025-37838, CVE-2025-37840, CVE-2025-37841, CVE-2025-37845, CVE-2025-37847, CVE-2025-37848, CVE-2025-37850, CVE-2025-37851, CVE-2025-37858, CVE-2025-37869, CVE-2025-37872, CVE-2025-37874, CVE-2025-37880, CVE-2025-37881, CVE-2025-37883, CVE-2025-37897, CVE-2025-37899, CVE-2025-37901, CVE-2025-37905, CVE-2025-37909, CVE-2025-37910, CVE-2025-37917, CVE-2025-37919, CVE-2025-37922, CVE-2025-37924, CVE-2025-37933, CVE-2025-37935, CVE-2025-37941, CVE-2025-37943, CVE-2025-37944, CVE-2025-37975, CVE-2025-37976, CVE-2025-37979, CVE-2025-37991 SUPPORT Ksplice support is available at ksplice-support...@oracle.com. _______________________________________________ El-errata mailing list El-errata@oss.oracle.com https://oss.oracle.com/mailman/listinfo/el-errata