El-errata: New Ksplice updates for RHCK 8 (ELSA-2021-1093)
Synopsis: ELSA-2021-1093 can now be patched using Ksplice
CVEs: CVE-2020-27152 CVE-2020-28374 CVE-2021-26708 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-3347
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2021-1093.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2021-1093.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 8 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-27363, CVE-2021-27364, CVE-2021-27365: Priviledge escalation in iSCSI subsystem.
Multiple logic errors failing to check some messages and sysfs
attribute sizes may cause a buffer overflow. A local attacker could
use this to cause a priviledge escalation.
Orabug: 32603381
* CVE-2021-26708: Privilege escalation in Virtual Socket protocol due to bad locking.
Wrong locking in Virtual Socket protocol implementation could lead to
a race condition. A local user could use this flaw for privilege
escalation.
* CVE-2020-27152: Denial-of-service in virtualized IOAPIC driver.
A logic error when handling interrupt in the virtualized IOAPIC driver
could lead to an infinite loop on the hypervisor. A local attacker from
a guest could use this flaw to cause a denial-of-service.
* CVE-2021-3347: Privilege escalation in the Fast Userspace Mutexes.
A flaw in the Fast Userspace Mutexes implementation could lead to
a use-after-free. A local user could use this flaw to crash the system
or escalate their privileges.
* CVE-2020-28374: Access control bypass when reading or writing TCM devices.
Lack of validation against the session's list when matching a Target Core
Mod (TCM) device during an eXtended COPY (XCOPY) operation leads to access
control bypass. Attackers with access to one device could read and write
from/to other devices they should not have access to.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.
New Ksplice updates for RHCK 8 has been released.