Oracle Linux 6277 Published by

New Ksplice updates has been released for RHCK 7.



El-errata: New Ksplice updates for RHCK 7 (ELSA-2021-3327)


Synopsis: ELSA-2021-3327 can now be patched using Ksplice
CVEs: CVE-2020-27777 CVE-2021-22555 CVE-2021-29154 CVE-2021-29650 CVE-2021-32399

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2021-3327.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2021-3327.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 7 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2021-29154: Code execution in eBPF JIT compiler.

Improper computation validation of branch displacements in eBPF JIT
compiler could lead to memory corruption. A local attacker with
the ability to insert eBPF instructions could use this flaw to cause
a denial-of-service or possibly execute arbitrary code.

* CVE-2021-32399: Code execution in the Bluetooth subsystem when removing an HCI controller.

A race condition flaw in the Bluetooth subsystem could lead to
a use-after-free of slab objects during HCI controller removal.
An local user could use this flaw to execute arbitrary code.

* CVE-2021-29650: Denial-of-service in Netfilter due to incorrect memory barrier.

Lack of a full memory barrier upon the assignment of a new table value
in the Netfilter subsystem could result in a system crash. A local user
could use this flaw to cause a denial-of-service.

* CVE-2021-22555: Privilege escalation in Netfilter due to out-of-bounds memory write.

A heap out-of-bounds write in netfilter could allow an attacker to gain
privileges or cause a denial-of-service.

* Note: Oracle has determined that CVE-2020-27777 is not applicable.

The kernel is not affected by CVE-2020-27777 since the code under
consideration is not compiled.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.