[El-errata] New glibc updates available via Ksplice (ELBA-2020-6015)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue Jan 5 05:23:41 PST 2021
Synopsis: ELBA-2020-6015 can now be patched using Ksplice
CVEs: CVE-2020-10029 CVE-2020-1752
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Bug Fix Advisory, ELBA-2020-6015.
INSTALLING THE UPDATES
We recommend that all users of Ksplice on OL 8 install these updates.
You can install these updates by running:
# ksplice -y user upgrade
32-bit applications should be restarted after upgrading the on-disk
glibc RPMs and statically linked applications using
glibc should be rebuilt to include these fixes.
Ksplice user-space patching requires installation of Ksplice-aware
packages and the system must be rebooted after the first installation of
these packages. Refer to the installation instructions for the Enhanced
Ksplice Client in the Ksplice User's Guide for more details. Systems
may be prepared for Ksplice patching by installing the Ksplice aware
packages in advance, prior to installing the enhanced Ksplice client.
* CVE-2020-10029: Buffer overflow when using sinl() function.
A logic error in sinl() function when passing a custom value could lead
to a buffer overflow. A local attacker could use this flaw to escalate
* CVE-2020-1752: Use-after-free when expanding tilde.
A logic error when expanding tilde could lead to use-after-free if a
specially crafted path is used. A local attacker could use this flaw to
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata