[Ksplice][Debian 9.0 Updates] New Ksplice updates for Debian 9.0 Stretch (DLA-2713-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Jul 22 20:16:10 PDT 2021
Synopsis: DLA-2713-1 can now be patched using Ksplice
CVEs: CVE-2021-21781 CVE-2021-33909 CVE-2021-34693 CVE-2021-3609
Systems running Debian 9.0 Stretch can now use Ksplice to patch
against the latest Debian kernel update, DLA-2713-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Debian 9.0
Stretch install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-33909: Code execution in the virtual file system.
An unsigned to signed integer conversion flaw in the virtual file system
implementation could lead to a system crash. A local attacker could use
this flaw to execute arbitrary code or cause a denial-of-service.
* CVE-2021-34693: Information leak in CAN BCM message.
The header of a CAN bus BCM message contains uninitialized memory that
is transmitted over the wire. A malicious device might exploit this to
gain information about the running system.
* CVE-2021-3609: Privilege escalation when registering CAN message receiver.
A race condition exists within the code for handling the registration
for a CAN message receiver via the CAN BCM protocol that results in a
use-after-free. A malicious local user can exploit this flaw to write
to arbitrary memory and escalate their privileges.
* Note: Oracle has determined that CVE-2021-21781 is not applicable.
Oracle has determined that CVE-2021-21781 is not applicable to amd64.
Applying the patch has no resulting changes in the generated object
files.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Debian-9.0-Updates
mailing list