Oracle Linux 6266 Published by

New Ksplice updates for RHCK 8 has been released.



El-errata: New Ksplice updates for RHCK 8 (ELSA-2021-1093)


Synopsis: ELSA-2021-1093 can now be patched using Ksplice
CVEs: CVE-2020-27152 CVE-2020-28374 CVE-2021-26708 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-3347

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2021-1093.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2021-1093.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 8 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2021-27363, CVE-2021-27364, CVE-2021-27365: Priviledge escalation in iSCSI subsystem.

Multiple logic errors failing to check some messages and sysfs
attribute sizes may cause a buffer overflow. A local attacker could
use this to cause a priviledge escalation.

Orabug: 32603381

* CVE-2021-26708: Privilege escalation in Virtual Socket protocol due to bad locking.

Wrong locking in Virtual Socket protocol implementation could lead to
a race condition. A local user could use this flaw for privilege
escalation.

* CVE-2020-27152: Denial-of-service in virtualized IOAPIC driver.

A logic error when handling interrupt in the virtualized IOAPIC driver
could lead to an infinite loop on the hypervisor. A local attacker from
a guest could use this flaw to cause a denial-of-service.

* CVE-2021-3347: Privilege escalation in the Fast Userspace Mutexes.

A flaw in the Fast Userspace Mutexes implementation could lead to
a use-after-free. A local user could use this flaw to crash the system
or escalate their privileges.

* CVE-2020-28374: Access control bypass when reading or writing TCM devices.

Lack of validation against the session's list when matching a Target Core
Mod (TCM) device during an eXtended COPY (XCOPY) operation leads to access
control bypass. Attackers with access to one device could read and write
from/to other devices they should not have access to.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.