Oracle Linux 6278 Published by

New Ksplice updates for UEKR5 4.14.35 on Oracle Linux 7 has been released.



El-errata: New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2021-9084)


Synopsis: ELSA-2021-9084 can now be patched using Ksplice
CVEs: CVE-2020-16120 CVE-2021-3347 CVE-2021-3348

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2021-9084.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2021-9084.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2021-3348: Use-after-free due to bad locking in Network block device.

A missing locking in Network block device could lead to use-after-free
when setting up a device. A local user could use this flaw to cause
a denial-of-service or to execute code.

Orabug: 32447287

* CVE-2021-3347: Privilege escalation in the Fast Userspace Mutexes.

A flaw in the Fast Userspace Mutexes implementation could lead to
a use-after-free. A local user could use this flaw to crash the system
or escalate their privileges.

Orabug: 32447189

* CVE-2020-16120: Read permission bypass with overlay filesystem.

A logic error in the overlay filesystem may cause the kernel to not properly
perform all required permission checks. A local attacker could use this to
bypass intended access restrictions.

Orabug: 32435220

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.