[Ksplice][Ubuntu-20.10-Updates] New Ksplice updates for Ubuntu 20.10 Groovy (USN-4984-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Jun 22 03:06:40 PDT 2021


Synopsis: USN-4984-1 can now be patched using Ksplice
CVEs: CVE-2021-28038 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28952 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29266 CVE-2021-29647 CVE-2021-30002 CVE-2021-31916 CVE-2021-33033 CVE-2021-3483

Systems running Ubuntu 20.10 Groovy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-4984-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 20.10
Groovy install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2021-28038, XSA-367: Mishandling of errors causes DoS of Xen backend.

Error conditions in the net Xen backend driver may incorrectly cause
kernel assertion failures. A malicious or buggy Xen frontend might
trigger these conditions, causing a denial-of-service in the host.


* CVE-2021-28964: Denial-of-service in the btrfs filesystem.

Lack of proper locking when resolving back-references as part of some
filesystems operations could lead to a kernel assertion to trigger.  An
unprivileged user could use this flaw to cause a denial-of-service.


* CVE-2021-28971: Denial-of-service due to PEBS status mishandling in Intel processors Support.

PEBS status mishandling in PEBS records of Intel processors Support
might lead to a situation on some Haswell and earlier systems when
userspace applications could cause a system crash. A local user could
use this flaw to cause a denial-of-service.


* CVE-2021-28660: Out-of-bounds writes in Realtek RTL8188EU Wireless LAN NIC driver.

A missing error handling check in Realtek RTL8188EU Wireless LAN NIC
driver could lead to out-of-bounds writes. A local user could use this
flaw for a denial-of-service or code execution.


* CVE-2021-28688, XSA-371: Xen Hypervisor persistant grant leakage.

A logic error when initializing pointers under certain circumstances
may overwrite unreclamied values. A local user could use to exhaust
system resources, leading to a denial-of-service.


* CVE-2021-30002: Denial-of-service in V4L2 driver due to memory leaks.

A flaw in the exit code sequence of V4L2 driver could lead to memory
leaks. A local user could use this flaw to cause a denial-of-service.


* CVE-2021-31916: Information disclosure due to out-of-bounds writes in the Multi-device driver.

A flaw in ioctls of Multiple devices driver support could lead to
out-of-bounds memory writes. An attacker with special user
(CAP_SYS_ADMIN) privilege could use this flaw for denial-of-service
or information disclosure.


* CVE-2021-29647: Information disclosure in receives of Qualcomm IPC router protocol.

A partially uninitialized data structure in receive data path of
Qualcomm IPC router protocol could lead to a leak of sensitive
information from kernel memory. A local user could use this flaw
for information disclosure.


* Improved update to CVE-2021-29266: Use-after-free in Vhost when reopening a character device.

A flaw in the Vhost implementation could lead to a use-after-free memory
corruption when reopening a character device. A local user could use
this flaw to cause a denial-of-service or possibly execute arbitrary
code.


* CVE-2021-28950: Denial-of-service in FUSE due to improper inodes handling.

A failure to properly handle bad inodes in the FUSE user space file
system implementation could lead to a CPU stall because a retry loop
continually finds the same bad inode. A local attacker could use this
flaw to cause a denial of service.


* CVE-2021-3483: Code execution in FireWire packet sniffer due to improper reference counting.

A reference counting flaw in ioctls of IEEE 1394 FireWire packet sniffer
could allow a device to be started twice leading to a use-after-free.
A local user could use this flaw to cause a code execution or a denial
of service.


* CVE-2021-33033: Use-after-free in NetLabel subsystem due to improper reference counting.

A flaw in CIPSO and CALIPSO reference counting scheme of NetLabel packet
labeling framework could lead to a use-after-free. A local use could this
flaw for a code execution or a denial-of-service.


* Note: Oracle has determined that CVE-2021-28952 is not applicable.

Oracle has determined that CVE-2021-28952 is not applicable to x86.
Applying the patch has no resulting changes in the generated object
files.


* Note: Oracle has determined that CVE-2021-28972 is not applicable.

Oracle has determined that CVE-2021-28972 is not applicable to x86.
Applying the patch has no resulting changes in the generated object
files.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-20.10-updates mailing list