[El-errata] New Ksplice updates for RHCK 8 (ELSA-2023-1566)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Apr 17 12:30:57 UTC 2023
Synopsis: ELSA-2023-1566 can now be patched using Ksplice
CVEs: CVE-2022-2663 CVE-2022-4269 CVE-2022-4378 CVE-2023-0266 CVE-2023-0386
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-1566.
More information about this errata can be found at
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 8 install
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2022-4378: Privilege escalation in the proc filesystem.
Incorrect bounds checking and an integer overflow in the proc
filesystem could lead to out-of-bounds memory writes. An unprivileged
user could use this flaw to cause a denial-of-service or elevate
* CVE-2022-4269: Denial-of-service in Traffic Control subsystem.
A flaw in the Traffic Control subsystem when the transport protocol in
use (TCP or SCTP) does a retransmission could result in a deadlock.
A local unprivileged user could use this flaw for denial-of-service.
* CVE-2023-0266: Use-after-free in ALSA PCM IOCTL processing.
Missing locks around certain operations can lead to a use-after-free
in the ALSA PCM driver. This flaw could by exploited by a local
attacker to escalate their privileges.
* CVE-2022-2663: Firewall bypass in IRC connection tracking.
An issue in nf_conntrack_irc in unencrypted IRC protocol message
handling could result in messages being incorrectly matched by the
firewall. A remote user could use this flaw to bypass local firewall
* CVE-2023-0386: Privilege escalation in Overlay filesystem.
A uid mapping bug in OverlayFS when copying a capable file from a nosuid
mount into another mount may allow a low-privileged user to run a binary
as root. A local unprivileged user can use this flaw to gain
administrative privileges on the system.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata