Oracle Linux 10 : ELSA-2025-20095-0: / kernel (ELSA-2025-200950)

medium Nessus Plugin ID 277130

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2025-200950 advisory.

- selftests: tls: add tests for zero-length records (CKI Backport Bot) [RHEL-114328] {CVE-2025-39682}
- tls: fix handling of zero-length records on the rx_list (CKI Backport Bot) [RHEL-114328] {CVE-2025-39682}
- sctp: linearize cloned gso packets in sctp_rcv (CKI Backport Bot) [RHEL-113338] {CVE-2025-38718}
- ipv6: reject malicious packets in ipv6_gso_segment() (CKI Backport Bot) [RHEL-113251] {CVE-2025-38572}
- wifi: ath12k: Decrement TID on RX peer frag setup error handling (CKI Backport Bot) [RHEL-114710] {CVE-2025-39761}
- xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CKI Backport Bot) [RHEL-109531] {CVE-2025-38500}
- ipv6: mcast: Delay put pmc->idev in mld_del_delrec() (Hangbin Liu) [RHEL-111156] {CVE-2025-38550}
- tcp: Correct signedness in skb remaining space calculation (Florian Westphal) [RHEL-107843] {CVE-2025-38463}
- io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CKI Backport Bot) [RHEL-114338] {CVE-2025-39698}
- net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (CKI Backport Bot) [RHEL-106587] {CVE-2025-38468}
- dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using (Audra Mitchell) [RHEL-106609] {CVE-2025-38369}
- HID: core: Harden s32ton() against conversion to 0 bits (Benjamin Tissoires) [RHEL-111038] {CVE-2025-38556}
- fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (Audra Mitchell) [RHEL-106613] {CVE-2025-38396}
- s390/sclp: Fix SCCB present check (CKI Backport Bot) [RHEL-113560] {CVE-2025-39694}
- idpf: convert control queue mutex to a spinlock (CKI Backport Bot) [RHEL-106059] {CVE-2025-38392}
- x86/process: Move the buffer clearing before MONITOR (Waiman Long) [RHEL-83893 RHEL-83903] {CVE-2024-36357 CVE-2024-36350}
- x86/microcode/AMD: Add TSA microcode SHAs (Waiman Long) [RHEL-83893 RHEL-83903] {CVE-2024-36357 CVE-2024-36350}
- KVM: SVM: Advertise TSA CPUID bits to guests (Waiman Long) [RHEL-83893 RHEL-83903] {CVE-2024-36357 CVE-2024-36350}
- x86/bugs: Add a Transient Scheduler Attacks mitigation (Waiman Long) [RHEL-83893 RHEL-83903] {CVE-2024-36357 CVE-2024-36350}
- x86/bugs: Rename MDS machinery to something more generic (Waiman Long) [RHEL-83893 RHEL-83903] {CVE-2024-36357 CVE-2024-36350}
- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (Waiman Long) [RHEL-83893] {CVE-2025-22047}
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CKI Backport Bot) [RHEL-112787] {CVE-2025-38352}
- netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (Florian Westphal) [RHEL-106441] {CVE-2025-38472}
- sunrpc: fix handling of server side tls alerts (Olga Kornievskaia) [RHEL-111072] {CVE-2025-38566}
- sunrpc: fix client side handling of tls alerts (Olga Kornievskaia) [RHEL-110814] {CVE-2025-38571}
- tipc: Fix use-after-free in tipc_conn_close(). (CKI Backport Bot) [RHEL-106663] {CVE-2025-38464}

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2025-20095-0.html

Plugin Details

Severity: Medium

ID: 277130

File Name: oraclelinux_ELSA-2025-200950.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/3/2025

Updated: 12/3/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38369

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 5.7

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-28956

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kernel-tools-libs-devel, p-cpe:/a:oracle:linux:kernel-debug-modules-extra, p-cpe:/a:oracle:linux:kernel-debug-devel-matched, p-cpe:/a:oracle:linux:kernel-uki-virt-addons, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:python3-perf, p-cpe:/a:oracle:linux:kernel-tools-libs, p-cpe:/a:oracle:linux:kernel-modules-extra-matched, p-cpe:/a:oracle:linux:rv, p-cpe:/a:oracle:linux:kernel-debug-modules-core, p-cpe:/a:oracle:linux:kernel-modules-extra, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel, p-cpe:/a:oracle:linux:kernel-core, p-cpe:/a:oracle:linux:kernel-cross-headers, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:libperf, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel-devel-matched, p-cpe:/a:oracle:linux:rtla, p-cpe:/a:oracle:linux:kernel-tools, p-cpe:/a:oracle:linux:kernel-modules, p-cpe:/a:oracle:linux:kernel-uki-virt, cpe:/o:oracle:linux:10:1:baseos_base, p-cpe:/a:oracle:linux:kernel-modules-core, p-cpe:/a:oracle:linux:perf, p-cpe:/a:oracle:linux:kernel-abi-stablelists, p-cpe:/a:oracle:linux:kernel-debug-core, p-cpe:/a:oracle:linux:kernel-debug-uki-virt, cpe:/o:oracle:linux:10, p-cpe:/a:oracle:linux:kernel-debug-modules

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Ease: No known exploits are available

Patch Publication Date: 11/25/2025

Vulnerability Publication Date: 12/12/2023

Reference Information

CVE: CVE-2024-28956, CVE-2024-36350, CVE-2024-36357, CVE-2024-49570, CVE-2024-52332, CVE-2024-53147, CVE-2024-53216, CVE-2024-53222, CVE-2024-53241, CVE-2024-54456, CVE-2024-56662, CVE-2024-56675, CVE-2024-56690, CVE-2024-57901, CVE-2024-57902, CVE-2024-57941, CVE-2024-57942, CVE-2024-57977, CVE-2024-57981, CVE-2024-57984, CVE-2024-57986, CVE-2024-57987, CVE-2024-57988, CVE-2024-57989, CVE-2024-57995, CVE-2024-58004, CVE-2024-58005, CVE-2024-58006, CVE-2024-58012, CVE-2024-58013, CVE-2024-58014, CVE-2024-58015, CVE-2024-58020, CVE-2024-58057, CVE-2024-58061, CVE-2024-58069, CVE-2024-58072, CVE-2024-58075, CVE-2024-58077, CVE-2024-58088, CVE-2025-21647, CVE-2025-21652, CVE-2025-21655, CVE-2025-21671, CVE-2025-21680, CVE-2025-21691, CVE-2025-21693, CVE-2025-21696, CVE-2025-21702, CVE-2025-21726, CVE-2025-21732, CVE-2025-21738, CVE-2025-21741, CVE-2025-21742, CVE-2025-21743, CVE-2025-21750, CVE-2025-21761, CVE-2025-21765, CVE-2025-21771, CVE-2025-21777, CVE-2025-21785, CVE-2025-21786, CVE-2025-21790, CVE-2025-21791, CVE-2025-21795, CVE-2025-21796, CVE-2025-21826, CVE-2025-21828, CVE-2025-21844, CVE-2025-21846, CVE-2025-21847, CVE-2025-21851, CVE-2025-21853, CVE-2025-21855, CVE-2025-21857, CVE-2025-21861, CVE-2025-21863, CVE-2025-21864, CVE-2025-21976, CVE-2025-22056, CVE-2025-37749, CVE-2025-37994, CVE-2025-38116, CVE-2025-38369, CVE-2025-38412, CVE-2025-38468

IAVB: 2024-B-0200