Oracle Linux 6277 Published by

New Ksplice updates for RHCK 8 are available.



El-errata: New Ksplice updates for RHCK 8 (ELSA-2023-1566)


Synopsis: ELSA-2023-1566 can now be patched using Ksplice
CVEs: CVE-2022-2663 CVE-2022-4269 CVE-2022-4378 CVE-2023-0266 CVE-2023-0386

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-1566.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2023-1566.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 8 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2022-4378: Privilege escalation in the proc filesystem.

Incorrect bounds checking and an integer overflow in the proc
filesystem could lead to out-of-bounds memory writes. An unprivileged
user could use this flaw to cause a denial-of-service or elevate
privileges.

* CVE-2022-4269: Denial-of-service in Traffic Control subsystem.

A flaw in the Traffic Control subsystem when the transport protocol in
use (TCP or SCTP) does a retransmission could result in a deadlock.
A local unprivileged user could use this flaw for denial-of-service.

* CVE-2023-0266: Use-after-free in ALSA PCM IOCTL processing.

Missing locks around certain operations can lead to a use-after-free
in the ALSA PCM driver. This flaw could by exploited by a local
attacker to escalate their privileges.

* CVE-2022-2663: Firewall bypass in IRC connection tracking.

An issue in nf_conntrack_irc in unencrypted IRC protocol message
handling could result in messages being incorrectly matched by the
firewall. A remote user could use this flaw to bypass local firewall
rules.

* CVE-2023-0386: Privilege escalation in Overlay filesystem.

A uid mapping bug in OverlayFS when copying a capable file from a nosuid
mount into another mount may allow a low-privileged user to run a binary
as root. A local unprivileged user can use this flaw to gain
administrative privileges on the system.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.



_______________________________________________