[El-errata] New Ksplice updates for RHCK 6 (ELSA-2022-9781)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Oct 13 09:57:27 UTC 2022

Synopsis: ELSA-2022-9781 can now be patched using Ksplice
CVEs: CVE-2020-0466 CVE-2021-0920 CVE-2021-1048 CVE-2021-4155 CVE-2022-0492

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9781.
More information about this errata can be found at


We recommend that all users of Ksplice Uptrack running RHCK 6 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


* CVE-2020-0466, CVE-2021-1048: Use-after-free in epoll subsystem.

Improper reference counting in the epoll subsystem could lead to a
use-after-free when file descriptors are concurrently removed from
an epoll instance. An unprivileged user could use this flaw to cause
a denial-of-service or escalate privileges.

Orabug: 34086960

* Make unix_gc_lock symbol global.

Export unix_gc_lock to other compilations units for subsequent updates
instead of including
"net: split out functions related to registering inflight socket files"
as preparatory commit, because it moves too much code around.

* CVE-2021-0920: Privilege escalation in BSD Unix domain sockets.

Lack of synchronization in BSD Unix domain sockets module could result
in a use after free error. A local user could use this flaw to cause
a denial-of-service or privileges escalation.

Orabug: 34086960

* CVE-2021-4155: Data leak in XFS filesystem.

The XFS filesystem does not correctly initialize certain data blocks. This
could allow data leaks to unprivileged users.

Orabug: 34086960

* CVE-2022-0492: Privilege escalation in Control Groups feature.

A missing capabilities check flaw in the Control Groups feature when
setting release_agent in the initial user namespace could result in
bypassing namespace isolation. A local user could use this flaw to
escalate privilege.

Orabug: 34086960


Ksplice support is available at ksplice-support_ww at oracle.com.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 265 bytes
Desc: not available
URL: <http://oss.oracle.com/pipermail/el-errata/attachments/20221013/2588c805/attachment.sig>

More information about the El-errata mailing list