[El-errata] New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2022-9425)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue May 31 08:28:20 UTC 2022
Synopsis: ELSA-2022-9425 can now be patched using Ksplice
CVEs: CVE-2022-1786 CVE-2022-21499
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9425.
More information about this errata can be found at
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2022-1786: Information disclosure in io_uring IO interface.
A logic flaw in io_uring IO interface when more than one task performing
asynchronous IO submissions on a ring could result in assignment of
the context from the current task rather than from the request
originator. A local user could use this flaw for information disclosure.
* CVE-2022-21499: Privilege escalation in the kernel debug subsystem.
Insufficient protection checks in the kernel debug subsystem when using KGDB
and KDB allow reads and writes to kernel memory during kernel lockdown. A
remote attacker with access to a serial port (for example, via a hypervisor
console) could use the debugger to escalate privileges.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata