Oracle Linux 6278 Published by

New Ksplice updates for UEKR6 5.4.17 on Oracle Linux 7 and Oracle Linux 8 has been released.



El-errata: New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2022-9365)


Synopsis: ELSA-2022-9365 can now be patched using Ksplice
CVEs: CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2021-45095 CVE-2022-0886 CVE-2022-1055 CVE-2022-27666

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9365.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2022-9365.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* Note: Oracle will not provide a zero-downtime update for CVE-2020-24502, CVE-2020-24503 or CVE-2020-24504.

CVE-2020-24502, CVE-2020-24503 and CVE-2020-24504 are vulnerabilities
in the Intel ICE ethernet controller. Oracle has determined that
patching these vulnerabilities would not be safe and recommends
rebooting into the latest kernel.

Orabug: 33993157

* CVE-2021-45095: Denial-of-service in Phone Network protocol due to memory leaks.

A reference counting flaw in the Phone Network protocol functionality
when handling an error condition could lead to memory leaks. A local
user could use this flaw to cause a denial-of-service.

Orabug: 33962760

* CVE-2022-1055: Use-after-free in Packet classifier API.

A missing cleanup of variables when creating an new filter in Packet
classifier API could lead to a use-after-free. A local user could use
this flaw to cause a denial-of-service or code execution.

Orabug: 34027161

* CVE-2022-27666, CVE-2022-0886: Privilege escalation in IPsec ESP transformation.

A logic flaw in IPsec ESP transformation implementation could lead to
a heap buffer overflow. A local user could use this flaw to overwrite
kernel heap objects and cause privilege escalation.

Orabug: 33997299

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.