[Ksplice][EL6-Updates] New Ksplice updates for OL 6, RHEL 6, CentOS 6, and Scientific Linux 6 (ELSA-2022-9781)

Oracle Ksplice quentin.casasnovas at oracle.com
Mon Sep 26 13:58:20 UTC 2022


Synopsis: ELSA-2022-9781 can now be patched using Ksplice
CVEs: CVE-2020-0466 CVE-2021-0920 CVE-2021-1048 CVE-2021-4155 CVE-2022-0492

Systems running RHCK on Oracle Linux 6, Red Hat Enterprise Linux 6,
CentOS 6, and Scientific Linux 6 can now use Ksplice to patch against
the latest Red Hat kernel update, ELSA-2022-9781.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2022-9781.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running OL 6, RHEL 6,
CentOS 6, and Scientific Linux 6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2020-0466, CVE-2021-1048: Use-after-free in epoll subsystem.

Improper reference counting in the epoll subsystem could lead to a
use-after-free when file descriptors are concurrently removed from
an epoll instance. An unprivileged user could use this flaw to cause
a denial-of-service or escalate privileges.

Orabug: 34086960


* Make unix_gc_lock symbol global.

Export unix_gc_lock to other compilations units for subsequent updates
instead of including
"net: split out functions related to registering inflight socket files"
as preparatory commit, because it moves too much code around.


* CVE-2021-0920: Privilege escalation in BSD Unix domain sockets.

Lack of synchronization in BSD Unix domain sockets module could result
in a use after free error. A local user could use this flaw to cause
a denial-of-service or privileges escalation.

Orabug: 34086960


* CVE-2021-4155: Data leak in XFS filesystem.

The XFS filesystem does not correctly initialize certain data blocks. This
could allow data leaks to unprivileged users.

Orabug: 34086960


* CVE-2022-0492: Privilege escalation in Control Groups feature.

A missing capabilities check flaw in the Control Groups feature when
setting release_agent in the initial user namespace could result in
bypassing namespace isolation. A local user could use this flaw to
escalate privilege.

Orabug: 34086960

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-EL6-Updates mailing list