Synopsis: ELSA-2026-50061, ELSA-2026-50071 can now be patched using Ksplice
CVEs: CVE-2025-39964 CVE-2025-40022 CVE-2025-40248 CVE-2025-40280

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2026-50061.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2026-50061.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2025-40022, CVE-2025-39964: Improper handling of concurrent input in 
crypto subsystem.

Orabug: 38855313


* CVE-2025-40248: Use-after-free in Virtual Socket protocol driver.

Orabug: 38855319


* CVE-2025-40280: Use-after-free in TIPC Protocol driver.

Orabug: 38855323


SUPPORT

Ksplice support is available at [email protected].


Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Reply via email to