New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2023-12874)
Synopsis: ELSA-2023-12874 can now be patched using Ksplice
CVEs: CVE-2022-0185 CVE-2023-1206 CVE-2023-1611 CVE-2023-20569 CVE-2023-20588 CVE-2023-34319 CVE-2023-3611 CVE-2023-3772 CVE-2023-39194 CVE-2023-40283 CVE-2023-4128 CVE-2023-4194 CVE-2023-4911 CVE-2023-5090
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-12874.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-12874.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-5090: Privilege escalation from KVM guests when configuring the x2apic.
A logic error in the KVM MSR interception routine allows a KVM guest to
configure the host x2apic. A local, unprivileged guest VM could use this
flaw to escalate privileges to that of the host hypervisor.
* Improved Known exploit detection for CVE-2022-0185.
* CVE-2023-5090: Privilege escalation from KVM guests when configuring the x2apic.
A logic error in the KVM MSR interception routine allows a KVM guest to
configure the host x2apic. A local, unprivileged guest VM could use this
flaw to escalate privileges to that of the host hypervisor.
* CVE-2023-3611: Privilege escalation in QFQ network scheduler.
An arithmetic error in the Quick Fair Queueing network scheduler can
lead to an out-of-bounds write. This flaw can be exploited by a local
attacker to escalate their privilege.
* CVE-2023-4128: Use-after-free when modifying Netfilter U32/route filters.
A logic error when copying an internal memory structure can lead to a
use-after-free when modifying certain Netfilter filters. A local
attacker could exploit this flaw to escalate their privileges.
* CVE-2023-40283: Use-after-free during Bluetooth socket teardown.
An incomplete cleanup operation when tearing down Bluetooth L2CAP
sockets can lead to a use-after-free. This flaw could potentially be
exploited to cause a denial-of-service or other unexpected behavior.
* CVE-2023-3772: Denial-of-service in the IP framework for transforming packets.
A missing check in the IP framework for transforming packets could lead
to a NULL pointer dereference. A local attacker could use this flaw to
cause a denial-of-service.
* Performance improvement when using shared memory virtual filesystem.
Improve performance with allocation of shared memory huge pages.
Orabug: 35655117
* CVE-2023-4194: Permission bypass when using TUN/TAP device driver.
Usage of an incorrect permission attribute when opening a TAP or TUN
device could lead to a permission bypass. A local attacker could use
this flaw to bypass network filters and gain unauthorized access.
* Add possibility to disable usage of io_uring subsystem.
io_uring subsystem has many security issues with some of it being
impossible to live patch. Thus, Oracle decided to add a way for customer
not using io_uring to disable it for unprivileged user by using
/proc/sys/kernel/io_uring_disabled knob.
Note that io_uring is disabled by default for unprivileged users.
Orabug: 35819375
* CVE-2023-34319, XSA-432: Buffer overflow in Xen netback driver.
Incorrect logic in the Xen netback driver while handling packets can lead to a
buffer overflow. An unprivileged guest can cause denial-of-service of the host
network.
* CVE-2023-1611: Use-after-free in the BTRFS filesystem.
A use-after-free is possible in the BTRFS file system when a quota assign ioctl
and quota disable ioctls run concurrently. A local user could use this flaw to
cause a denial-of-service or execute arbitrary code.
* CVE-2023-39194: Information disclosure when using xfrm subsystem.
A missing check when using xfrm subsystem could lead to an out-of-bounds
access. A local user could use this flaw to leak sensitive information.
* CVE-2023-20588: Information disclosure on AMD CPUs.
A hardware flaw on some AMD processors when handling division-by-zero
errors may result in speculative data exposure. An attacker could use this
flaw to access sensitive information.
Orabug: 35776936
* Note: Oracle will not provide a zero-downtime update for CVE-2023-1206.
Oracle has determined that patching CVE-2023-1206 on a running system
would not be safe and recommends a reboot.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-20569.
Oracle has determined that patching CVE-2023-20569 on a running system
would not be safe and recommends a reboot.
Orabug: 35818857
* CVE-2023-4911: Buffer overflow in the GNU C Library's dynamic loader while processing environment variables.
Incorrect processing of environment variables in the GNU C Library's
dynamic loader ld.so can result in buffer overflow. This flaw could
allow a local attacker to elevate their privileges when launching
binaries with SUID permission.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.
New Ksplice updates for UEKR6 5.4.17 on Oracle Linux 7 and 8 are available.