[El-errata] New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2022-9787)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Fri Sep 23 18:02:06 UTC 2022
Synopsis: ELSA-2022-9787 can now be patched using Ksplice
CVEs: CVE-2021-33655 CVE-2021-33656 CVE-2022-0812 CVE-2022-21546
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9787.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2022-9787.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2022-0812: Information leak in NFS RDMA transport.
The RDMA transport method for NFS RPCs fails to properly calculate the
size of its headers. This could result in uninitialized kernel data
being inadvertently transmitted over the network.
* CVE-2021-33656: Out-of-bounds write access in Virtual Terminal.
A flaw in ioctls of Virtual Terminal could result in out-of-bounds write
access when setting font with malicious data by some ioctl commands.
A local user could use this flaw for a denial-of-service or code
execution.
* CVE-2021-33655: Out-of-bounds write when user specifies invalid font size.
A failure to check if a user-specified font size is valid in the fbcon
driver can lead to an out-of-bounds write. A malicious local user could
exploit this flaw to cause a denial-of-service, or to aid in another
type of attack.
* CVE-2022-21546: Denial-of-service in SCSI write path.
Improper handling of certain types of writes to a SCSI device can
lead to a kernel crash. A local attacker could exploit this flaw to
cause a denial-of-service.
Orabug: 34419972
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list