Synopsis: ELSA-2026-50255 can now be patched using Ksplice CVEs: CVE-2025-54505 CVE-2025-71120 CVE-2026-23074 CVE-2026-31431
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2026-50255. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2026-50255.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on OL7 and OL8 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2025-54505: Information leak in AMD Zen1 processors. * CVE-2025-71120: Null pointer dereference in SunRPC GSS. Orabug: 38852342 * CVE-2026-23074: Use-after-free in TEQL network scheduler. Orabug: 38930950 * CVE-2026-31431: Privilege escalation in userspace AEAD crypto API. SUPPORT Ksplice support is available at [email protected].
signature.asc
Description: This is a digitally signed message part
_______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
