[Ksplice][Ubuntu-20.10-Updates] New Ksplice updates for Ubuntu 20.10 Groovy (USN-4984-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Jun 22 03:06:40 PDT 2021
Synopsis: USN-4984-1 can now be patched using Ksplice
CVEs: CVE-2021-28038 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28952 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29266 CVE-2021-29647 CVE-2021-30002 CVE-2021-31916 CVE-2021-33033 CVE-2021-3483
Systems running Ubuntu 20.10 Groovy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-4984-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 20.10
Groovy install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-28038, XSA-367: Mishandling of errors causes DoS of Xen backend.
Error conditions in the net Xen backend driver may incorrectly cause
kernel assertion failures. A malicious or buggy Xen frontend might
trigger these conditions, causing a denial-of-service in the host.
* CVE-2021-28964: Denial-of-service in the btrfs filesystem.
Lack of proper locking when resolving back-references as part of some
filesystems operations could lead to a kernel assertion to trigger. An
unprivileged user could use this flaw to cause a denial-of-service.
* CVE-2021-28971: Denial-of-service due to PEBS status mishandling in Intel processors Support.
PEBS status mishandling in PEBS records of Intel processors Support
might lead to a situation on some Haswell and earlier systems when
userspace applications could cause a system crash. A local user could
use this flaw to cause a denial-of-service.
* CVE-2021-28660: Out-of-bounds writes in Realtek RTL8188EU Wireless LAN NIC driver.
A missing error handling check in Realtek RTL8188EU Wireless LAN NIC
driver could lead to out-of-bounds writes. A local user could use this
flaw for a denial-of-service or code execution.
* CVE-2021-28688, XSA-371: Xen Hypervisor persistant grant leakage.
A logic error when initializing pointers under certain circumstances
may overwrite unreclamied values. A local user could use to exhaust
system resources, leading to a denial-of-service.
* CVE-2021-30002: Denial-of-service in V4L2 driver due to memory leaks.
A flaw in the exit code sequence of V4L2 driver could lead to memory
leaks. A local user could use this flaw to cause a denial-of-service.
* CVE-2021-31916: Information disclosure due to out-of-bounds writes in the Multi-device driver.
A flaw in ioctls of Multiple devices driver support could lead to
out-of-bounds memory writes. An attacker with special user
(CAP_SYS_ADMIN) privilege could use this flaw for denial-of-service
or information disclosure.
* CVE-2021-29647: Information disclosure in receives of Qualcomm IPC router protocol.
A partially uninitialized data structure in receive data path of
Qualcomm IPC router protocol could lead to a leak of sensitive
information from kernel memory. A local user could use this flaw
for information disclosure.
* Improved update to CVE-2021-29266: Use-after-free in Vhost when reopening a character device.
A flaw in the Vhost implementation could lead to a use-after-free memory
corruption when reopening a character device. A local user could use
this flaw to cause a denial-of-service or possibly execute arbitrary
code.
* CVE-2021-28950: Denial-of-service in FUSE due to improper inodes handling.
A failure to properly handle bad inodes in the FUSE user space file
system implementation could lead to a CPU stall because a retry loop
continually finds the same bad inode. A local attacker could use this
flaw to cause a denial of service.
* CVE-2021-3483: Code execution in FireWire packet sniffer due to improper reference counting.
A reference counting flaw in ioctls of IEEE 1394 FireWire packet sniffer
could allow a device to be started twice leading to a use-after-free.
A local user could use this flaw to cause a code execution or a denial
of service.
* CVE-2021-33033: Use-after-free in NetLabel subsystem due to improper reference counting.
A flaw in CIPSO and CALIPSO reference counting scheme of NetLabel packet
labeling framework could lead to a use-after-free. A local use could this
flaw for a code execution or a denial-of-service.
* Note: Oracle has determined that CVE-2021-28952 is not applicable.
Oracle has determined that CVE-2021-28952 is not applicable to x86.
Applying the patch has no resulting changes in the generated object
files.
* Note: Oracle has determined that CVE-2021-28972 is not applicable.
Oracle has determined that CVE-2021-28972 is not applicable to x86.
Applying the patch has no resulting changes in the generated object
files.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-20.10-updates
mailing list