[Ksplice][Ubuntu-20.04-Updates] New Ksplice updates for Ubuntu 20.04 Focal (USN-5728-1)

Oracle Ksplice quentin.casasnovas at oracle.com
Mon Dec 12 22:16:09 UTC 2022


Synopsis: USN-5728-1 can now be patched using Ksplice
CVEs: CVE-2022-2153 CVE-2022-2978 CVE-2022-3028 CVE-2022-3061 CVE-2022-3577 CVE-2022-3625 CVE-2022-3629 CVE-2022-3633 CVE-2022-3635 CVE-2022-39188 CVE-2022-40768 CVE-2022-41222 CVE-2022-42719

Systems running Ubuntu 20.04 Focal can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-5728-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 20.04
Focal install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-40768: Information leak using scsi driver.

A missing zeroing of on-stack memory passed to userspace in scsi driver
could lead to an information leak. A local attacker could use this flaw
to leak information about running kernel and facilitate an attack.


* CVE-2022-2978: Denial-of-service when initializing inodes.

A logic error when initializing inodes could lead to an invalid memory
access. A local attacker could use this flaw to cause a denial-of-
service.


* CVE-2022-3028: Out-of-bounds memory access in IP framework XFRM subsystem.

A race condition can occur when multiple calls to the same function
in the IP framework can lead to a race condition, and subsequent
out-of-bounds memory accesses.  A local attacker could exploit this flaw
to leak kernel memory, or make arbitrary writes to kernel memory.


* CVE-2022-41222: Use-after-free in MMU-based Paged Memory Management Support.

A race condition flaw in MMU-based Paged Memory Management Support due
to improper locking could result in use-after-free when moving page
tables. A local user could use this flaw for denial-of-service or code
execution.


* CVE-2022-2153: Denial-of-service in Kernel-based Virtual Machine.

A logic flaw in Kernel-based Virtual Machine in some cases when KVM
initializes a vCPU without creating APIC could result in NULL pointer
dereference. A local user could use this flaw for a denial-of-service.


* CVE-2022-3625: Denial-of-service in the Netlink device interface implementation.

A missing check when setting or getting Netlink device parameters could
lead to a use-after-free. A local attacker could use this flaw to cause
a denial-of-service or possibly execute arbitrary code.


* CVE-2022-3629: Memory leak in virtual socket protocol.

A race condition in VMware vSockets Driver when attempting to connect a
vsock in non-blocking mode may lead to a reference count leak. A local
attacker could use this flaw to exhaust kernel memory and eventually
cause a denial-of-service.


* CVE-2022-3635: Denial-of-service in IDT 77252 ATM PCI driver.

A missing removal of a timer in IDT 77252 ATM PCI driver could lead to
usage of resources after the device exit. A local attacker could use
this flaw to cause a denial-of-service.


* CVE-2022-3061: Denial-of-service in i740fb framebuffer driver.

Improper checking of userspace provided arguments in i740fb when
setting the 'pixclock' hardware property may lead to a divide-by-zero
bug. A local attacker could use this flaw for a denial-of-service.


* CVE-2022-3633: Denial-of-Service in j1939 CAN driver.

A reference counting flaw in the j1939 CAN driver when destroying a
session could lead to a memory-leak of socket buffers. A local attacker
could use this flaw to exhaust kernel memory and eventually cause a
denial-of-service.


* CVE-2022-39188: Denial-of-service in MMU-based Paged Memory Management Support.

A flaw in MMU-based Paged Memory Management Support when unmapping
a memory region could result in a system crash. A local user could use
this flaw for denial-of-service.


* CVE-2022-3577: Memory leak when registering pvrusb2 driver.

A missing free of resources when registering pvrusb2 driver could lead
to a memory leak. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2022-42719: Privilege escalation in mac80211 subsystem.

An improper resources management in mac80211 subsystem can lead to
a use after free error. A local attacker able to inject WLAN frames
could use this flaw to cause denial of service or escalate privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-20.04-updates mailing list