[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (RHSA-2020:4286)

Gregory Herrero gregory.herrero at oracle.com
Thu Oct 22 08:36:13 PDT 2020


Synopsis: RHSA-2020:4286 can now be patched using Ksplice
CVEs: CVE-2020-12351 CVE-2020-12352 CVE-2020-14331 CVE-2020-14385 CVE-2020-14386

Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat Security
Advisory, RHSA-2020:4286.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2020-14386: Memory corruption when receiving a packet.

An interger overflow when receiving a packet on an AF_PACKET socket could
lead to memory corruption.  An unprivileged user could use this flaw to
elevate its privileges.


* CVE-2020-14385: Denial of service in XFS filesystem.

A flaw in XFS filesystem could cause an inode with a valid extended
attribute to be wrongly flagged as corrupted leading to the XFS
filesystem shutdown. A local, unprivileged user could use this flaw for
a denial-of-service.


* CVE-2020-14331: Out-of-bounds writes in ioctls of Console display driver.

Out-of-bounds writes in ioctls of Console display driver could happen
when calling an ioctl VT_RESIZE in order to resize the console. This
flaw could allow a local user with access to the VGA console to crash
the system or potentially escalating their privileges on the system.


* CVE-2020-12352: Information leak when handling AMP packets in Bluetooth stack.

A missing zeroing of stack memory when handling AMP packets in Bluetooth
stack could lead to an information leak. A remote attacker could use this
flaw to leak information about running kernel and facilitate an attack.


* CVE-2020-12351: Denial-of-service in L2CAP bluetooth driver.

Logic errors in L2CAP bluetooth driver could let a remote attacker cause
a denial-of-service or potentially execute arbitrary code on the system.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-EL8-updates mailing list