Oracle Linux 6278 Published by

New Ksplice updates has been released for UEKR5 4.14.35 on Oracle Linux 7.



El-errata: New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2023-12007)


Synopsis: ELSA-2023-12007 can now be patched using Ksplice
CVEs: CVE-2022-20369 CVE-2022-2978 CVE-2022-3542 CVE-2022-3594 CVE-2022-3621 CVE-2022-3646 CVE-2022-3649 CVE-2022-41850 CVE-2022-43750

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-12007.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2023-12007.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* Note: Oracle has determined that CVE-2022-3621 is not applicable.

A missing sanity check in nilfs2 when handling corrupted on-disk
filesystem data could lead to a NULL pointer dereference. A local user
could use this flaw for a denial-of-service.

The kernel is not affected by CVE-2022-3621 since the code under
consideration is not compiled.

* CVE-2022-3594: Denial-of-service in r8152 USB network driver.

Improper management of logging in the r8152 driver when handling
interrupts can lead to logging of excessive data. A remote attacker
could use this flaw to flood the system logs and hinder the ability to
detect anomalous conditions.

* CVE-2022-2978: Denial-of-service when initializing inodes.

A logic error when initializing inodes could lead to an invalid memory
access. A local attacker could use this flaw to cause a denial-of-
service.

* Note: Oracle has determined that CVE-2022-3649 is not applicable.

A missing sanity check in nilfs2 when handling corrupted on-disk
filesystem data could lead to a use-after-free. An attacker could use
this flaw to cause a denial-of-service or escalate privileges.

The kernel is not affected by CVE-2022-3649 since the code under
consideration is not compiled.

* Note: Oracle has determined that CVE-2022-3542 is not applicable.

The kernel is not affected by CVE-2022-3542 since the code under
consideration is not compiled.

* Note: Oracle has determined that CVE-2022-3646 is not applicable.

A flaw in NILFS2 when failing to create a log write thread could lead to
a memory leak. A local attacker could use this flaw to exhaust system
memory and cause a denial-of-service.

The kernel is not affected by CVE-2022-3646 since the code under
consideration is not compiled.

* Denial-of-service in i2c-dev read/write ioctl.

A logic error when allocating a zero length buffer in the i2c-dev driver
can result in the dereference of an invalid pointer, leading to a Kernel
crash. A local user with access to an i2c-dev device could use this flaw
to cause a denial-of-service.

* CVE-2022-41850: Use-after-free during roccat device event processing.

A race condition can occur when the processing events for roccat
devices, which ultimately leads to a use-after-free. This flaw could
be exploited by a malicious local user to cause a denial-of-service, or
to aid in another type of attack.

* Note: Oracle will not provide a zero-downtime update for CVE-2022-20369.

Oracle has determined that the vulnerability does not affect a
running system.

Improper input validation in the Video for Linux API version 2 subsystem
can lead to an out-of-bounds write. This could lead to a local
escalation of privilege.

* Erroneous warning messages from Mellanox driver.

Under certain conditions the mlx5 driver will emit warnings to the user
about events that are not necessarily anomolous.

Orabug: 34834553

* CVE-2022-43750: Use-after-free in USB monitor.

Incorrect permission flags set on userspace memory mappings in usbmon
could lead to a use-after-free. A local attacker could use this flaw for
a denial-of-service or escalate privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.