Oracle Linux 6264 Published by

New Ksplice updates are available for RHCK 9.



New Ksplice updates for RHCK 9 (ELSA-2023-3723)


Synopsis: ELSA-2023-3723 can now be patched using Ksplice
CVEs: CVE-2023-2002 CVE-2023-2124 CVE-2023-2194 CVE-2023-2235 CVE-2023-28466 CVE-2023-32233

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-3723.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-3723.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 9 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2023-2235: Use-after-free in Performance Events subsystem.

Incorrect logic in the kernel's Performance Events subsystem can lead to a
use-after-free. This can allow a local user to escalate privileges.

* CVE-2023-32233: Use-after-free in Netfilter nf_tables packet classification framework.

Incorrect handling of anonymous sets in the Netfilter nf_tables packet
classification framework can lead to a use-after-free. This can allow a
local unprivileged user to perform arbitrary access to kernel memory and
escalate privileges.

* CVE-2023-2002: Insufficient capability check in the Bluetooth HCI sockets subsystem.

An insufficient capability check in the Bluetooth HCI sockets subsystem can
allow an unprivileged program to mark a socket as trusted. This can allow
escalation of privileges, denial-of-service and information leak.

* CVE-2023-28466: Race condition in Transport Layer Security subsystem.

A race condition in the Transport Layer Security (TLS) subsystem between
getsockopt() and setsockopt() operations can lead to use-after-free or null
dereference. This can allow a local user to cause denial-of-service.

* CVE-2023-2194: Insufficient input validation in APM X-Gene SoC I2C SLIMpro.

Insufficient user input validation in the APM X-Gene SoC I2C SLIMpro device
driver could allow writing beyond the end of a buffer. This could allow a
local privileged user to crash the system or execute incorrect code.

* CVE-2023-2124: Denial-of-service in XFS file system during image restoration.

Insufficient checks in XFS during image restoration after a failure
with a dirty log journal can lead to out-of-bounds memory access flaw.
A local attacker can use this flaw to cause denial-of-service or to
escalate their privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.