[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (ELSA-2023-1566)

Oracle Ksplice quentin.casasnovas at oracle.com
Mon Apr 17 12:28:51 UTC 2023


Synopsis: ELSA-2023-1566 can now be patched using Ksplice
CVEs: CVE-2022-2663 CVE-2022-4269 CVE-2022-4378 CVE-2023-0266 CVE-2023-0386

Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat kernel update,
ELSA-2023-1566.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-1566.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-4378: Privilege escalation in the proc filesystem.

Incorrect bounds checking and an integer overflow in the proc
filesystem could lead to out-of-bounds memory writes.  An unprivileged
user could use this flaw to cause a denial-of-service or elevate
privileges.


* CVE-2022-4269: Denial-of-service in Traffic Control subsystem.

A flaw in the Traffic Control subsystem when the transport protocol in
use (TCP or SCTP) does a retransmission could result in a deadlock.
A local unprivileged user could use this flaw for denial-of-service.


* CVE-2023-0266: Use-after-free in ALSA PCM IOCTL processing.

Missing locks around certain operations can lead to a use-after-free
in the ALSA PCM driver.  This flaw could by exploited by a local
attacker to escalate their privileges.


* CVE-2022-2663: Firewall bypass in IRC connection tracking.

An issue in nf_conntrack_irc in unencrypted IRC protocol message
handling could result in messages being incorrectly matched by the
firewall. A remote user could use this flaw to bypass local firewall
rules.


* CVE-2023-0386: Privilege escalation in Overlay filesystem.

A uid mapping bug in OverlayFS when copying a capable file from a nosuid
mount into another mount may allow a low-privileged user to run a binary
as root. A local unprivileged user can use this flaw to gain
administrative privileges on the system.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-EL8-updates mailing list