Oracle Linux 6278 Published by

New Ksplice updates for RHCK 6 are now available.



El-errata: New Ksplice updates for RHCK 6 (ELSA-2022-9781)


Synopsis: ELSA-2022-9781 can now be patched using Ksplice
CVEs: CVE-2020-0466 CVE-2021-0920 CVE-2021-1048 CVE-2021-4155 CVE-2022-0492

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9781.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2022-9781.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 6 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2020-0466, CVE-2021-1048: Use-after-free in epoll subsystem.

Improper reference counting in the epoll subsystem could lead to a
use-after-free when file descriptors are concurrently removed from
an epoll instance. An unprivileged user could use this flaw to cause
a denial-of-service or escalate privileges.

Orabug: 34086960

* Make unix_gc_lock symbol global.

Export unix_gc_lock to other compilations units for subsequent updates
instead of including
"net: split out functions related to registering inflight socket files"
as preparatory commit, because it moves too much code around.

* CVE-2021-0920: Privilege escalation in BSD Unix domain sockets.

Lack of synchronization in BSD Unix domain sockets module could result
in a use after free error. A local user could use this flaw to cause
a denial-of-service or privileges escalation.

Orabug: 34086960

* CVE-2021-4155: Data leak in XFS filesystem.

The XFS filesystem does not correctly initialize certain data blocks. This
could allow data leaks to unprivileged users.

Orabug: 34086960

* CVE-2022-0492: Privilege escalation in Control Groups feature.

A missing capabilities check flaw in the Control Groups feature when
setting release_agent in the initial user namespace could result in
bypassing namespace isolation. A local user could use this flaw to
escalate privilege.

Orabug: 34086960

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.


--a01705cd5fa093c478c35a44543f2345e4752c1873887623121bc1525a0b