Synopsis: ELSA-2026-50255 can now be patched using Ksplice
CVEs: CVE-2025-54505 CVE-2025-71120 CVE-2026-23074 CVE-2026-31431

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2026-50255.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2026-50255.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2025-54505: Information leak in AMD Zen1 processors.

* CVE-2025-71120: Null pointer dereference in SunRPC GSS.

Orabug: 38852342


* CVE-2026-23074: Use-after-free in TEQL network scheduler.

Orabug: 38930950


* CVE-2026-31431: Privilege escalation in userspace AEAD crypto API.

SUPPORT

Ksplice support is available at [email protected].


Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Reply via email to