[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (RHSA-2020:4286)
Gregory Herrero
gregory.herrero at oracle.com
Thu Oct 22 08:36:13 PDT 2020
Synopsis: RHSA-2020:4286 can now be patched using Ksplice
CVEs: CVE-2020-12351 CVE-2020-12352 CVE-2020-14331 CVE-2020-14385 CVE-2020-14386
Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat Security
Advisory, RHSA-2020:4286.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2020-14386: Memory corruption when receiving a packet.
An interger overflow when receiving a packet on an AF_PACKET socket could
lead to memory corruption. An unprivileged user could use this flaw to
elevate its privileges.
* CVE-2020-14385: Denial of service in XFS filesystem.
A flaw in XFS filesystem could cause an inode with a valid extended
attribute to be wrongly flagged as corrupted leading to the XFS
filesystem shutdown. A local, unprivileged user could use this flaw for
a denial-of-service.
* CVE-2020-14331: Out-of-bounds writes in ioctls of Console display driver.
Out-of-bounds writes in ioctls of Console display driver could happen
when calling an ioctl VT_RESIZE in order to resize the console. This
flaw could allow a local user with access to the VGA console to crash
the system or potentially escalating their privileges on the system.
* CVE-2020-12352: Information leak when handling AMP packets in Bluetooth stack.
A missing zeroing of stack memory when handling AMP packets in Bluetooth
stack could lead to an information leak. A remote attacker could use this
flaw to leak information about running kernel and facilitate an attack.
* CVE-2020-12351: Denial-of-service in L2CAP bluetooth driver.
Logic errors in L2CAP bluetooth driver could let a remote attacker cause
a denial-of-service or potentially execute arbitrary code on the system.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-EL8-updates
mailing list