[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2023-12393)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Jun 15 16:23:05 UTC 2023


Synopsis: ELSA-2023-12393 can now be patched using Ksplice
CVEs: CVE-2016-8655 CVE-2021-22600 CVE-2021-4034 CVE-2022-4269 
CVE-2022-4378 CVE-2022-4379 CVE-2023-1380 CVE-2023-1611 CVE-2023-1670 
CVE-2023-1855 CVE-2023-1859 CVE-2023-1990 CVE-2023-2002 CVE-2023-2194 
CVE-2023-2235 CVE-2023-28466 CVE-2023-30772 CVE-2023-31436 
CVE-2023-32233 CVE-2023-33203 CVE-2023-33288

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-12393.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-12393.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Enable livepatching of jump labels.




* CVE-2022-4269: Denial-of-service in Traffic Control subsystem.

A flaw in the Traffic Control subsystem when the transport protocol in
use (TCP or SCTP) does a retransmission could result in a deadlock.
A local unprivileged user could use this flaw for denial-of-service.


* CVE-2022-4379: Denial-of-service in NFS version 4 client.

A use-after-free flaw in NFS4 when when handling a server-to-server copy
may cause an invalid pointer dereference. A remote attacker could use this
flaw for a denial-of-service.


* CVE-2023-2235: Use-after-free in Performance Events subsystem.

Incorrect logic in the kernel's Performance Events subsystem can lead to a
use-after-free. This can allow a local user to escalate privileges.


* CVE-2023-28466: Race condition in Transport Layer Security subsystem.

A race condition in the Transport Layer Security (TLS) subsystem between
getsockopt() and setsockopt() operations can lead to use-after-free or null
dereference. This can allow a local user to cause denial-of-service.


* CVE-2023-1611: Use-after-free in the BTRFS filesystem.

A use-after-free is possible in the BTRFS file system when a quota 
assign ioctl
and quota disable ioctls run concurrently. A local user could use this 
flaw to
cause a denial-of-service or execute arbitrary code.


* CVE-2023-31436: Out-of-bounds write in QFQ packet scheduling driver.

An out-of-bounds write is possible in the Quick Fair Queueing Plus Scheduler
(QFQ) packet scheduling driver. a malicious local user could exploit 
this flaw
to escalate their privileges, or to cause a denial-of-service.


* CVE-2023-1380: Out-of-bounds read in Broadcom 802.11 Networking Device 
Driver.

Out-of-bounds read exists in the Broadcom 802.11 Networking Device 
Driver. This
can lead to a denial-of-service.


* CVE-2023-2002: Insufficient capability check in the Bluetooth HCI 
sockets subsystem.

An insufficient capability check in the Bluetooth HCI sockets subsystem can
allow an unprivileged program to mark a socket as trusted.  This can allow
escalation of privileges, denial-of-service and information leak.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-1990.

Oracle has determined that the vulnerability does not affect a
running system.


* CVE-2023-1855: Use-after-free in APM X-Gene SoC hardware monitoring 
driver.

A logic error in the APM X-Gene SoC hardware monitoring driver leads to a
use-after-free. A local user can use this flaw to cause denial-of-service or
leak information.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-30772.

Oracle has determined that the vulnerability does not affect a
running system.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-1670.

Oracle has determined that the vulnerability does not affect a
running system.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-1859.

Oracle has determined that the vulnerability does not affect a
running system.


* CVE-2023-2194: Insufficient input validation in APM X-Gene SoC I2C 
SLIMpro.

Insufficient user input validation in the APM X-Gene SoC I2C SLIMpro device
driver could allow writing beyond the end of a buffer. This could allow a
local privileged user to crash the system or execute incorrect code.


* CVE-2023-32233: Use-after-free in Netfilter nf_tables packet 
classification framework.

Incorrect handling of anonymous sets in the Netfilter nf_tables packet
classification framework can lead to a use-after-free.  This can allow a
local unprivileged user to perform arbitrary access to kernel memory and
escalate privileges.

Orabug: 35382083


* CVE-2023-33203: Use-after-free in Qualcomm EMAC Gigabit Ethernet Driver.

Incorrect cleanup logic in the Qualcomm Ethernet Media Access Controller
(EMAC) Driver can cause a use-after-free when an emac based device is
removed. This can allow a user with physical access to escalate privileges
or cause undefined behavior.


* CVE-2023-33288: Race condition in TI BQ24190 battery charger driver.

A race condition in the TI bq24190 battery charger driver can lead to a
user-after-free scenario. This flaw could be exploited by a malicious local
user to cause denial-of-service or other undefined behavior

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list