[Ksplice][Debian 9.0 Updates] New Ksplice updates for Debian 9.0 Stretch (DLA-2713-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Jul 22 20:16:10 PDT 2021


Synopsis: DLA-2713-1 can now be patched using Ksplice
CVEs: CVE-2021-21781 CVE-2021-33909 CVE-2021-34693 CVE-2021-3609

Systems running Debian 9.0 Stretch can now use Ksplice to patch
against the latest Debian kernel update, DLA-2713-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Debian 9.0
Stretch install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2021-33909: Code execution in the virtual file system.

An unsigned to signed integer conversion flaw in the virtual file system
implementation could lead to a system crash. A local attacker could use
this flaw to execute arbitrary code or cause a denial-of-service.


* CVE-2021-34693: Information leak in CAN BCM message.

The header of a CAN bus BCM message contains uninitialized memory that
is transmitted over the wire. A malicious device might exploit this to
gain information about the running system.


* CVE-2021-3609: Privilege escalation when registering CAN message receiver.

A race condition exists within the code for handling the registration
for a CAN message receiver via the CAN BCM protocol that results in a
use-after-free. A malicious local user can exploit this flaw to write
to arbitrary memory and escalate their privileges.


* Note: Oracle has determined that CVE-2021-21781 is not applicable.

Oracle has determined that CVE-2021-21781 is not applicable to amd64.
Applying the patch has no resulting changes in the generated object
files.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Debian-9.0-Updates mailing list