Oracle Linux 6278 Published by

New Ksplice updates has been released for UEKR4 4.1.12 on Oracle Linux 6 and 7.



El-errata: New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2020-5912)


Synopsis: ELSA-2020-5912 can now be patched using Ksplice
CVEs: CVE-2019-19530 CVE-2020-25211 CVE-2020-26541

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2020-5912.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2020-5912.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* Denial-of-service when aborting command in SCSI subsystem.

A null pointer dereference in QLA2XXX Fibre Channel driver when aborting
SCSI command leads to kernel crash. An attacker can exploit this to
cause a denial-of-service.

Orabug: 32020790

* CVE-2019-19530: Denial-of-service in USB CDC-ACM probing.

Incorrect reference counting when probing a USB CDC-ACM device could
result in a use-after-free and kernel crash. A local user with the
ability to insert USB devices could use this flaw to crash the system.

Orabug: 31351088

* CVE-2020-25211: Denial-of-service in Netfilter due to out-of-bounds memory access.

A flaw in Netfilter framework implementation could lead to
a out-of-bounds memory access. A local user could use this flaw to cause
a system crash and a denial-of-service.

Orabug: 31872865

* CVE-2020-26541: Kexec fails to validate loaded kernels against X.509 certificates.

When loading a kexec kernel, the running kernel fails to validate the
binary image being loaded against trusted X.509 signatures. This flaw
could potentially allow a local user with sufficient privileges to load
a malicious binary as the kexec kernel.

Orabug: 31961119

* Use-after-free in the Oracle ASM driver when handling a query operation.

Incorrect reference counting when handling a query operation in the Oracle
ASM driver could lead to a use-after-free. A local user with access to an
Oracle ASM filesystem could use this flaw to cause a denial-of-service or
potentially escalate privileges.

Orabug: 31832592

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.