Oracle Linux 6265 Published by

New Ksplice updates for UEKR3 3.8.13 on Oracle Linux 6 and 7 are available.



El-errata: New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2020-5706)


Synopsis: ELSA-2020-5706 can now be patched using Ksplice
CVEs: CVE-2013-4125 CVE-2018-18281 CVE-2019-19523 CVE-2019-19528 CVE-2019-19537

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2020-5706.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2020-5706.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR3 3.8.13 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2019-19528: Denial-of-service when disconnecting IO Warrior USB device.

Logic errors when disconnecting IO Warrior USB device could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.

Orabug: 31351063

* CVE-2019-19537: Denial-of-service in USB character device registration.

Incorrect locking when registering and deregistering a USB character
device could result in a use-after-free and kernel crash. A local user
with the ability to insert USB devices could use this flaw to crash the
system.

Orabug: 31317668

* CVE-2018-18281: Information leak in mremap syscall.

A logic error in the mremap code could allow one process to access
memory of a different process.

Orabug: 31352012

* CVE-2019-19523: Use-after-free when disconnecting ADU USB devices.

Logic errors when disconnecting ADU USB devices could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.

Orabug: 31240296

* CVE-2013-4125: Remote denial of service in IPv6 ECMP routing.

The kernel IPv6 networking stack does not correctly handle Router Advertisements
which contain equal-cost multi-path (ECMP) routes, allowing a remote attacker to
trigger a kernel panic.

Orabug: 30977687

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.