[El-errata] New Ksplice updates for RHCK 6 (ELSA-2022-9781)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Oct 13 09:57:27 UTC 2022
Synopsis: ELSA-2022-9781 can now be patched using Ksplice
CVEs: CVE-2020-0466 CVE-2021-0920 CVE-2021-1048 CVE-2021-4155 CVE-2022-0492
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9781.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2022-9781.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 6 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2020-0466, CVE-2021-1048: Use-after-free in epoll subsystem.
Improper reference counting in the epoll subsystem could lead to a
use-after-free when file descriptors are concurrently removed from
an epoll instance. An unprivileged user could use this flaw to cause
a denial-of-service or escalate privileges.
Orabug: 34086960
* Make unix_gc_lock symbol global.
Export unix_gc_lock to other compilations units for subsequent updates
instead of including
"net: split out functions related to registering inflight socket files"
as preparatory commit, because it moves too much code around.
* CVE-2021-0920: Privilege escalation in BSD Unix domain sockets.
Lack of synchronization in BSD Unix domain sockets module could result
in a use after free error. A local user could use this flaw to cause
a denial-of-service or privileges escalation.
Orabug: 34086960
* CVE-2021-4155: Data leak in XFS filesystem.
The XFS filesystem does not correctly initialize certain data blocks. This
could allow data leaks to unprivileged users.
Orabug: 34086960
* CVE-2022-0492: Privilege escalation in Control Groups feature.
A missing capabilities check flaw in the Control Groups feature when
setting release_agent in the initial user namespace could result in
bypassing namespace isolation. A local user could use this flaw to
escalate privilege.
Orabug: 34086960
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 265 bytes
Desc: not available
URL: <http://oss.oracle.com/pipermail/el-errata/attachments/20221013/2588c805/attachment.sig>
More information about the El-errata
mailing list