[El-errata] New Ksplice updates for RHCK 9 (ELSA-2023-5069)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Fri Oct 6 11:38:09 UTC 2023
Synopsis: ELSA-2023-5069 can now be patched using Ksplice
CVEs: CVE-2023-1637 CVE-2023-21102 CVE-2023-31248 CVE-2023-3390 CVE-2023-35001 CVE-2023-3610 CVE-2023-3776 CVE-2023-4004 CVE-2023-4147
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-5069.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-5069.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 9 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Note: Oracle has determined that CVE-2023-21102 is not applicable.
The kernel is not affected by CVE-2023-21102 since the code under
consideration is not compiled.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-3610.
Oracle has determined that patching CVE-2023-3610 on a running system would
not be safe and recommends a reboot.
* CVE-2023-3776: Use-after-free in netfilter classifier due to refcount error.
Incorrect refcounting in the netfilter classifier might result in
use-after-free, potentially allowing an attacker to cause a
denial-of-service.
* CVE-2023-4004: Privilege escalation in netfilter PIPAPO.
A use-after-free when removing a policy from the netfilter Pile Packet
Policies subsystem might result in a denial-of-service or arbitrary code
execution.
* CVE-2023-35001: Out-of-bounds memory access in Netfilter nf_tables packet classification framework.
A flaw in netfilter nf_tables when evaluating byteorder expressions may
lead to an out-of-bounds memory read or write. A local user with the
CAP_NET_ADMIN capability could use this flaw to escalate privileges.
* CVE-2023-31248: Use-after-free in Netfilter nf_tables packet classification framework.
A missing sanity check in netfilter nf_tables when looking up a deleted
chain by its ID may lead to a use-after-free. A local user with the
CAP_NET_ADMIN capability could use this flaw to escalate privileges.
* CVE-2023-4147: Netfilter rule chain addition causes DoS.
Missing validation when adding a rule to a bound netfilter rule chain
via NFTA_RULE_CHAIN_ID might result in an invalid operation and system
crash. A malicious user might exploit this to cause a denial-of-service.
* CVE-2023-3390: Use-after-free in Netfilter nf_tables packet classification framework.
Incorrect error path handling with NFT_MSG_NEWRULE in the Netfilter
nf_tables packet classification framework can lead to a use-after-free.
This can allow a local unprivileged user to perform arbitrary access to
kernel memory and escalate privileges.
* CVE-2023-1637: Speculative MSRs when suspend to RAM.
A speculative execution flaw that boot CPU could be vulnerable in the
Linux kernel X86 CPU Power management when user resuming CPU from
suspend to RAM was found. A local user could use this flaw to
get unauthorized access to memory.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list