[Ksplice][Ubuntu-20.04-Updates] New Ksplice updates for Ubuntu 20.04 Focal (USN-5622-1)
Oracle Ksplice
quentin.casasnovas at oracle.com
Thu Sep 22 09:31:39 UTC 2022
Synopsis: USN-5622-1 can now be patched using Ksplice
CVEs: CVE-2021-33655 CVE-2021-4034 CVE-2022-0854 CVE-2022-1012 CVE-2022-1184 CVE-2022-1729 CVE-2022-2503 CVE-2022-36946
Systems running Ubuntu 20.04 Focal can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-5622-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 20.04
Focal install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2022-1729: Privilege escalation in Performance Events due to improper locking.
Improper locking in the Performance Events implementation when opening
and associating a performance event to a task/CPU could result in a race
condition. A local, unprivileged user could use this flaw for privilege
escalation.
* CVE-2021-4034: Prevent empty argument list when executing processes.
Incorrect input validation in the pkexec program (part of Polkit) allows
any local user to become root.
* CVE-2021-33655: Privilege escalation when setting font or screen size.
A missing check when setting screen size or font could lead to an
out-of-bounds memory access. A local attacker could use this flaw to
cause a denial-of-service or escalate privileges.
* CVE-2022-1184: Use-after-free when handling corrupted hash tree in ext4.
A logic error when handling corrupted hash tree directory in ext4
filesystems could lead to a use-after-free. A local attacker could use
this flaw and a malicious ext4 image to cause a denial-of-service.
* CVE-2022-2503: Filesystem integrity check bypass in dm-verity.
A flaw in dm-verity allows users to switch out dm-verity target with
equivalent dm-linear targets and bypass filesystem integrity
verification. A privileged user could use this to load untrusted kernel
modules and firmware.
* CVE-2022-36946: Denial-of-service in netfilter packet handling.
A missing check in netfilter packet handling could lead to an assert.
A remote attacker could use this flaw to cause a denial-of-service.
* Improved fix for CVE-2022-0854: Information disclosure in DMA subsystem.
A flaw in the DMA subsystem when creating a mapping for a buffer could
result in a memory leak. A local user could use this flaw for
information disclosure.
* CVE-2022-1012: Information disclosure in TCP.
Insufficient randomness in TCP source port number generation when
opening TCP connections to remote host could lead to an information
leak. A remote attacker can use this to fingerprint a network host.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-20.04-updates
mailing list