El-errata: New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2021-9621)
Synopsis: ELSA-2021-9621 can now be patched using Ksplice
CVEs: CVE-2021-34556 CVE-2021-35477 CVE-2021-3753 CVE-2021-41864 CVE-2021-42252
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2021-9621.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2021-9621.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-3753: information disclosure in virtual terminal device.
A race condition flaw in its ioctl handling of the virtual terminal
device implementation could lead to out-of-bounds reads. A local user
could use this flaw for information disclosure.
* Note: Oracle has determined that CVE-2021-42252 is not applicable.
Oracle has determined that CVE-2021-42252 is not applicable to
the running kernel. Applying the patch has no resulting changes
in the generated object files.
* Note: Oracle will not provide a zero-downtime update for CVE-2021-34556, CVE-2021-35477.
An unprivileged BPF program can obtain sensitive information from kernel memory
via a Speculative Store Bypass side-channel attack by leveraging certain flaws
in the BPF implementation if unprivileged BPF is enabled.
Oracle has determined that patching CVE-2021-34556 and CVE-2021-35477 on
a running system would not be safe. These vulnerabilities have a medium
CVSS score of 5.5. In addition, disabling unprivileged BPF can be used
as a runtime mitigation.
Oracle recommends disabling unprivileged BPF or rebooting into the newest
kernel to mitigate these vulnerabilities.
* CVE-2021-41864: Code execution in BPF due to out-of-bounds writes.
An integer overflow flaw Berkeley Packet Filter when preallocating
objects for stack maps could result in out-of-bounds writes.
A privileged local user could use this to cause a denial of service or
possibly execute arbitrary code.
Orabug: 33431722
* Denial-of-service in NFSv4 client code losing connection.
Multiple logic errors in the Netfilter Connection Tracking sub-system
could lead NFSv4 client connections to drop and cause hangs on
the client side.
Orabug: 33524419
* Denial-of-service in AMD SVM support with Hyper-V role and Credential Guard enabled.
Logic error in AMD SVM support could result in a system crash at VM
boot when booting a VM with Hyper-V role and Credential Guard enabled
on AMD Zen2 or Zen3 machine.
Orabug: 33590307
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.
_______________________________________________
New Ksplice updates for UEKR6 5.4.17 on Oracle Linux 7 and 8 are available.