[El-errata] New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2022-9425)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Tue May 31 08:28:20 UTC 2022

Synopsis: ELSA-2022-9425 can now be patched using Ksplice
CVEs: CVE-2022-1786 CVE-2022-21499

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9425.
More information about this errata can be found at


We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


* CVE-2022-1786: Information disclosure in io_uring IO interface.

A logic flaw in io_uring IO interface when more than one task performing
asynchronous IO submissions on a ring could result in assignment of
the context from the current task rather than from the request
originator. A local user could use this flaw for information disclosure.

Orabug: 34186552

* CVE-2022-21499: Privilege escalation in the kernel debug subsystem.

Insufficient protection checks in the kernel debug subsystem when using KGDB
and KDB allow reads and writes to kernel memory during kernel lockdown. A
remote attacker with access to a serial port (for example, via a hypervisor
console) could use the debugger to escalate privileges.

Orabug: 34152699


Ksplice support is available at ksplice-support_ww at oracle.com.

More information about the El-errata mailing list