Oracle Linux 6264 Published by

New Ksplice updates for UEKR6 5.4.17 on Oracle Linux 7 and 8 has been released.



El-errata: New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2022-9926)


Synopsis: ELSA-2022-9926 can now be patched using Ksplice
CVEs: CVE-2021-4159 CVE-2022-1679 CVE-2022-20369 CVE-2022-3028 CVE-2022-36123 CVE-2022-36879 CVE-2022-36946 CVE-2022-41222

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9926.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2022-9926.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* Note: Oracle will not provide a zero-downtime update for CVE-2022-20369.

Oracle has determined that the vulnerability does not affect a
running system.

Improper input validation in the Video for Linux API version 2 subsystem
can lead to an out-of-bounds write. This could lead to a local
escalation of privilege.

* CVE-2022-36946: Denial-of-service in netfilter packet handling.

A missing check in netfilter packet handling could lead to an assert.
A remote attacker could use this flaw to cause a denial-of-service.

* CVE-2022-1679: Use-after-free in Atheros ath9k wireless device driver.

Improper handling of some error conditions in Atheros ath9k wireless
device driver could lead to a use-after-free. A local user could use
this flaw to cause a denial of service or execute arbitrary code.

* CVE-2022-3028: Information disclosure in XFRM subsystem.

A race condition flaw in XFRM subsystem when using PF_KEYv2 socket
family could result in out-of-bounds read or write access. A local user
could use this flaw for information disclosure.

Orabug: 34566752

* CVE-2022-41222: Use-after-free in MMU-based Paged Memory Management Support.

A race condition flaw in MMU-based Paged Memory Management Support due
to improper locking could result in use-after-free when moving page
tables. A local user could use this flaw for denial-of-service or code
execution.

* CVE-2021-4159: Information disclosure in EBPF verifier.

A flaw in EBPF verifier when handling internal data structures could
result in internal memory disclosure to userspace. A local that has
permissions to insert eBPF code could use this flaw for information
disclosure.

* CVE-2022-36879: Denial-of-service in XFRM.

An incorrect reference counting flaw in IP framework for transforming
packets when manipulating XFRM policy entries could result in release
a resource before it is made available for re-use. A local user could
use this flaw for a denial-of-service.

* Clear the CR4 register during guests reset on AMD CPUs.

Failure to clear the CR4 register during guest virtual machines reset
on AMD CPUs could result in failure of the guests to booting due to
the X86_CR4_PCIDE bit being left set in the CR4 register.

Orabug: 34610277

* Note: Oracle will not be providing an update for CVE-2022-36123.

This CVE is only applicable at boot time, so by the time Ksplice live updates
are applied, the relevant code has already ran.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.


_______________________________________________