[El-errata] New Ksplice updates for RHCK 9 (ELSA-2024-1248)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Mon Apr 22 10:24:44 UTC 2024


Synopsis: ELSA-2024-1248 can now be patched using Ksplice
CVEs: CVE-2023-4244 CVE-2023-4569 CVE-2023-51042 CVE-2023-5197 CVE-2023-52454 CVE-2023-52620 CVE-2023-5717 CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6606 CVE-2023-6610 CVE-2023-6817 CVE-2024-0193 CVE-2024-0646

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-1248.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-1248.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 9 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Note: Oracle will not provide a zero-downtime update for CVE-2023-4244.

A race condition in the set implementation of nftables between
the control plane and the garbage collection worker could lead to a
use-after-free. A local user with CAP_NET_ADMIN access could use this
flaw to cause a crash or expose sensitive kernel information.

Oracle has determined that patching CVE-2023-4244 on a running system
would not be safe and recommends a reboot.

On workloads that permit it, a temporary mitigation is to disallow
unprivileged users from creating namespaces:

sudo sysctl -w kernel.unprivileged_userns_clone=0


* CVE-2023-6610: Information disclosure in Common Internet File System.

The CIFS network file system implementation did not always
properly validate the server frame size, which could lead to
an out-of-bounds write. A local attacker could use this flaw
to cause a denial-of-service or potentially expose sensitive
information.


* CVE-2023-6606: Information disclosure in Common Internet File System.

The CIFS network file system implementation did not always
properly validate the server frame size, which could lead to
an out-of-bounds write. A local attacker could use this flaw
to cause a denial-of-service or potentially expose sensitive
information.


* CVE-2023-5717: Privilege escalation in the Linux kernel's Performance Events.

A logic error in the Linux kernel's Performance Events could lead to a
heap out-of-bounds write. A local attacker could use this flaw to cause
a denial-of-service or escalate privileges.


* CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-52454: Denial-of-service when using NVMe over TCP.

Incorrect handling of lengths and offsets in fields of TCP packets
by the NVMe driver could lead to a NULL pointer dereference. A remote
attacker could exploit this flaw to cause a denial-of-service by
sending specially-crafted malicious packets.


* CVE-2023-51042: Use-after-free vulnerability in AMD GPU driver.

An incorrect handling of kernel strucures in AMD GPU Linux kernel
can lead to use-after-free vulnerability. The flaw can be used by
a local attacker to cause denial-of-service.


* CVE-2024-0646: Out-of-bounds write in the TLS networking stack.

Incorrect handling of plaintext message buffers during transmission
can lead to an out-of-bounds write. A local attacker can exploit
this flaw to cause denial-of-service or privilege escalation.


* Note: Oracle will not provide a zero-downtime update for CVE-2024-0193.

The Netfilter subsystem did not properly check deactivated elements
in some situations, which could lead to a use-after-free vulnerability.
A local attacker could use this flaw to cause a denial-of-service or
potentially escalate privileges.

The kernel is not affected by CVE-2023-0193.


* CVE-2023-5197: Use-after-free in the netfilter subsystem.

A flaw in nf_tables when adding and removing of rules from chain bindings
within the same transaction may lead to a use-after-free. A local user
could use this flaw for privilege escalation.


* CVE-2023-6817: Privilege escalation in Netfilter.

The Netfilter subsystem did not properly handle inactive elements
in its PIPAPO data structure, which could lead to a use-after-free
vulnerability. A local attacker could use this flaw to cause a
denial-of-service or potentially escalate privileges.


* CVE-2023-4569: Denial-of-service in netfilter nf_tables.

Incorrectly disabled catch-all set elements may result in a memory leak.
An attacker could use this flaw to exhaust the system's memory and
eventually cause a denial-of-service.


* CVE-2023-52620: Resource injection in the netfilter subsystem.

In incorrect parameters validation in netfilter subsystem can
lead to a change of data structures internal to kernel. A local
attacker can use this flaw to cause system instability or as a
leverage in another type of attack.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list