Oracle Linux 6277 Published by

New Ksplice updates for UEKR5 4.14.35 on Oracle Linux 7 has been released.



El-errata: New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2022-9787)


Synopsis: ELSA-2022-9787 can now be patched using Ksplice
CVEs: CVE-2021-33655 CVE-2021-33656 CVE-2022-0812 CVE-2022-21546

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9787.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2022-9787.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2022-0812: Information leak in NFS RDMA transport.

The RDMA transport method for NFS RPCs fails to properly calculate the
size of its headers. This could result in uninitialized kernel data
being inadvertently transmitted over the network.

* CVE-2021-33656: Out-of-bounds write access in Virtual Terminal.

A flaw in ioctls of Virtual Terminal could result in out-of-bounds write
access when setting font with malicious data by some ioctl commands.
A local user could use this flaw for a denial-of-service or code
execution.

* CVE-2021-33655: Out-of-bounds write when user specifies invalid font size.

A failure to check if a user-specified font size is valid in the fbcon
driver can lead to an out-of-bounds write. A malicious local user could
exploit this flaw to cause a denial-of-service, or to aid in another
type of attack.

* CVE-2022-21546: Denial-of-service in SCSI write path.

Improper handling of certain types of writes to a SCSI device can
lead to a kernel crash. A local attacker could exploit this flaw to
cause a denial-of-service.

Orabug: 34419972

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.

_______________________________________________