[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (RHSA-2020:3010)
Gregory Herrero
gregory.herrero at oracle.com
Wed Aug 26 08:03:55 PDT 2020
Synopsis: RHSA-2020:3010 can now be patched using Ksplice
CVEs: CVE-2019-19807 CVE-2019-3016 CVE-2020-10757 CVE-2020-10766 CVE-2020-10767 CVE-2020-10768 CVE-2020-12653 CVE-2020-12654
Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat Security
Advisory, RHSA-2020:3010.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2020-12654: Denial-of-service when querying WMM status in mwifiex driver.
If an AP sends a malicious query to the station for WMM status, a buffer
overflow could occur. If an attacker can compromise the AP, this bug
could be triggered to cause a denial-of-service.
* CVE-2019-19807: Use-after-free when registering timer in ALSA driver.
A logic error when registering timer in ALSA driver fails could lead to
a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2020-10757: Flaw in DAX page mapping allows privilege escalation.
A flaw in the kernel handling for remapping huge pages mishandles pages
mapped for the DAX (direct userspace access) subsystem. A user with
access to DAX-mapped storage could exploit this to escalate their
privileges.
* CVE-2020-12653: Denial-of-service when scanning for APs in mwifiex driver.
Failing to validate user-defined length parameter could cause an
out-of-bound memory access while scanning for APs in mwifiex driver. An
attacker could exploit this bug to cause a denial-of-service.
* CVE-2019-3016: Privilege escalation in KVM guest paravirtualized TLB flushes.
A race condition when performing a paravirtualized TLB flush could
result in stale mappings in a KVM guest potentially allowing processes
access to pages from other processes. A local unprivileged user could
use this flaw to crash the system or potentially, escalate privileges.
* CVE-2020-10766: Information leak using Spectre V4 variant.
A logic error when context switching between multiple processes could
let an attacker disable SSBD mitigation and leak information about
victim process.
* CVE-2020-10767: Information leak using Spectre V2 attack due to IBPB being disabled.
A logic error when STIBP is not supported by the hardware makes IBPB
disabled unconditionally by default. A local attacker could use this
flaw to leak information about other processes.
* CVE-2020-10768: Information leak using Spectre V2 gadgets due to incorrect prctl configuration.
A logic error could let a local user enable indirect branch prediction
even if it has been force disabled to mitigate Spectre V2 attacks. A
local attacker could use this flaw to leak information about a victim
process.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-EL8-updates
mailing list