[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2024-12887)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Dec 19 21:04:21 UTC 2024


Synopsis: ELSA-2024-12887 can now be patched using Ksplice
CVEs: CVE-2022-20158 CVE-2023-52530 CVE-2024-26921 CVE-2024-26925 CVE-2024-38544 CVE-2024-39463 CVE-2024-41016 CVE-2024-46695 CVE-2024-46858 CVE-2024-46865 CVE-2024-47670 CVE-2024-47685 CVE-2024-47692 CVE-2024-47701 CVE-2024-47706 CVE-2024-47739 CVE-2024-47742 CVE-2024-49860 CVE-2024-49867 CVE-2024-49868 CVE-2024-49878 CVE-2024-49882 CVE-2024-49883 CVE-2024-49884 CVE-2024-49936 CVE-2024-49944 CVE-2024-49948 CVE-2024-49949 CVE-2024-49952 CVE-2024-49957 CVE-2024-49966 CVE-2024-49982 CVE-2024-49983 CVE-2024-49995 CVE-2024-50033 CVE-2024-50035 CVE-2024-50045 CVE-2024-50076 CVE-2024-50110 CVE-2024-50115 CVE-2024-50142 CVE-2024-50151 CVE-2024-50179 CVE-2024-50195 CVE-2024-50208 CVE-2024-50210 CVE-2024-50218 CVE-2024-50251 CVE-2024-53057

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12887.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12887.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-20158: Privilege escalation in core filesystem layer.

A use-after-free when using the core filesystem layer could lead to
memory corruption. A local attacker could use this flaw to escalate
privileges.


* CVE-2023-52530: Privilege escalation when adding a key in Generic IEEE 802.11 Networking Stack (mac80211).

A missing check when adding a key in Generic IEEE 802.11 Networking
Stack (mac80211) could lead to a use-after-free. A local attacker could
use this flaw to escalate privileges or facilitate an attack.


* CVE-2024-26921: Code execution in TCP/IP networking.

A logic error when handling IP packet fragments in TCP/IP networking
could lead to a use-after-free. A local attacker could use this flaw to
execute arbitrary code in kernel mode.


* CVE-2024-38544: Denial-of-service in Software RDMA over Ethernet (RoCE) driver.

A race condition when using the Software RDMA over Ethernet (RoCE)
driver could lead to a use-after-free. An attacker could use this flaw
to cause a denial-of-service.


* CVE-2024-39463: Privilege escalation in Plan 9 Resource Sharing (9P2000) driver.

A locking error when using the Plan 9 Resource Sharing (9P2000) driver
could lead to a use-after-free. A local attacker could use this flaw to
escalate privileges.


* CVE-2024-41016: Privilege escalation in OCFS2 file system driver.

A missing check when reading extended attributes in the OCFS2 file
system driver could lead to an out-of-bounds memory access. A local
attacker could use a crafted image to escalate privileges.


* CVE-2024-46695: Permission bypass in NSA SELinux driver.

A logic error when a NFS client tries to change SELinux files context on
a disk exported by a NFS server could lead to permission bypass.


* CVE-2024-46858: Privilege escalation in Multipath TCP driver.

A logic error when using the Multipath TCP driver could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.


* CVE-2024-46865: Denial-of-service in Foo protocol over UDP.

A logic error when using the Foo protocol over UDP could lead to use of
uninitialized memory. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2024-47670: Privilege escalation in OCFS2 file system driver.

A missing check when reading extended attributes in the OCFS2 file
system driver could lead to an out-of-bounds memory access. A local
attacker could use a crafted image to escalate privileges.


* CVE-2024-47685: Remote information leak in IPv6 packet rejection component.

A missing check when using the IPv6 packet rejection component could
lead to use of uninitialized memory. A remote attacker could use this
flaw to extract sensitive information.


* CVE-2024-47692: Denial-of-service in NFS server driver.

A missing check when using the NFS server driver could lead to a NULL
pointer dereference. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2024-47701: Privilege escalation in ext4 filesystem.

A race condition when using the ext4 filesystem could lead to an
out-of-bounds memory access. A local attacker could use this flaw to
escalate privileges.


* CVE-2024-47706: Privilege escalation in block layer driver.

A missing check when using the block layer driver could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.


* CVE-2024-47739: Denial-of-service in padata subsystem.

A locking error when using the padata subsystem could lead to a deadlock.
A local attacker could use this flaw to cause a denial-of-service.


* CVE-2024-47742: Privilege escalation in firmware loader driver.

A missing check when user loads a firmware using the firmware loader
driver indirectly could lead to loading arbitrary files. A local
attacker could use this flaw to escalate privileges.


* CVE-2024-49860: Information leak in ACPI driver.

A missing check when using the ACPI driver could lead to an
out-of-bounds memory read. A local attacker could use this flaw to
extract sensitive information.


* CVE-2024-49867: Privilege escalation in BTRFS filesystem.

A missing flush when unmounting the BTRFS filesystem could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.


* CVE-2024-49868: Denial-of-service in BTRFS filesystem.

A missing check when using the BTRFS filesystem could lead to a NULL
pointer dereference. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2024-49878: Information leak in kernel resource manager with CXL memory.

A logic error in the kernel resource manager when CXL memory is in use
could lead to accessing normally restricted part of the memory. A local
attacker could use this flaw to leak sensitive information.


* CVE-2024-49882: Code execution in ext4 filesystem.

A logic error in the ext4 filesystem could lead to a double free. A
local attacker could use this flaw to execute arbitrary code in kernel
mode.


* CVE-2024-49883: Privilege escalation in ext4 filesystem.

A logic error when using the ext4 filesystem could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.


* CVE-2024-49884: Privilege escalation in EXT4 filesystem driver.

A logic error when adding extent in the EXT4 filesystem driver could
lead to a use-after-free. A local attacker could use this flaw to
escalate privileges.


* CVE-2024-49936: Privilege escalation in Xen backend network device driver.

A locking error when using the Xen backend network device driver could
lead to a use-after-free. An attacker from a guest VM could use this
flaw to escalate privileges.


* CVE-2024-49944: Denial-of-service in SCTP Protocol driver.

A logic error when listening on a socket in the SCTP Protocol driver
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.


* CVE-2024-49948, CVE-2024-49949: Denial-of-service in core networking layer.

Missing checks on maliciously crafted packets from userspace could
cause an underflow leading to a NULL pointer dereference. A local
attacker could use this flaw to cause a denial-of-service.


* CVE-2024-49952: Denial-of-service in netfilter packet duplicator.

A logic error when using the netfilter packet duplicator could lead to a
kernel oops. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2024-49957: Denial-of-service in OCFS2 file system driver.

A logic error when mounting a filesystem with a corrupted journal in the
OCFS2 file system driver could lead to a NULL pointer dereference. A
local attacker could use this flaw to cause a denial-of-service.


* CVE-2024-49966: Privilege escalation in OCFS2 file system driver.

A logic error when reading information header from global quota file in
the OCFS2 file system driver could lead to a use-after-free. A local
attacker could use this flaw to escalate privileges.


* CVE-2024-49982: Use-after-free in ATA-over-Ethernet driver.

Due to incorrect handling of device refcount in the ATA-over-Ethernet
(AoE) driver, a race is possible between freeing of an AoE device and
access through associated socket buffers, leading to a use-after-free.
A local attacker can exploit this flaw to cause a denial-of-service or
execute arbitrary code.


* CVE-2024-49983: Privilege escalation in EXT4 filesystem driver.

A logic error when using fast commit feature of the EXT4 filesystem
driver could lead to a use-after-free. A local attacker could use this
flaw to escalate privileges.


* CVE-2024-49995: Privilege escalation in TIPC Protocol driver.

A logic error when setting TIPC bearer name in the TIPC Protocol driver
could lead to an out-of-bounds memory access. A local attacker could use
this flaw to escalate privileges.


* CVE-2024-50033: Privilege escalation in SLHC driver.

A logic error when using the Van Jacobson TCP/IP Serial Line Header
Compression (SLHC) driver could lead to an out-of-bounds memory access.
A local attacker could use this flaw to escalate privileges.


* CVE-2024-50035: Information leak in PPP (point-to-point protocol) networking stack.

A missing check when transmitting using the PPP networking stack could
lead to use of uninitialized memory. A local attacker could use this
flaw to extract sensitive information.


* CVE-2024-50045: Denial-of-service in bridge netfilter driver.

A logic error when sending traffic using the bridge netfilter driver
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.


* CVE-2024-50076: Information leak in virtual console driver.

A missing initialization of allocated memory when getting font
information in the virtual console driver could lead to use of
uninitialized memory. A local attacker could use this flaw to extract
sensitive information.


* CVE-2024-50110: Information leak in Transformation user configuration interface.

A logic error when dumping information in the Transformation user
configuration interface could lead to use of uninitialized memory. A
local attacker could use this flaw to extract sensitive information.


* CVE-2024-50115: Privilege escalation in KVM SVM driver.

A missing check when retrieving nested guest pages in the KVM SVM driver
could lead to an out-of-bounds memory access. A local attacker could use
this flaw to escalate privileges.


* CVE-2024-50142: Denial-of-service in transformation user configuration interface.

A logic error when using the transformation user configuration interface
could lead to an integer overflow. A local attacker could use this flaw
to cause a denial-of-service.


* CVE-2024-50151: Privilege escalation in SMB3 and CIFS driver.

A missing check when using the SMB3 and CIFS driver could lead to an
out-of-bounds memory access. A local attacker could use this flaw to
escalate privileges.


* CVE-2024-50179: Denial-of-service in Ceph distributed file system driver.

A logic error when setting dirty pages in the Ceph distributed file
system driver could lead to a kernel assertion failure. A local attacker
could use this flaw to cause a denial-of-service.


* CVE-2024-50195, CVE-2024-50210: Denial-of-service in dynamic POSIX clock driver.

A missing check when using the dynamic POSIX clock driver could lead to
invalid time being set. A local attacker could use this flaw to cause a
denial-of-service or other types of attacks (since other kernel parts or
drivers may depend on the set time).


* CVE-2024-50208: Privilege escalation in Broadcom Netxtreme HCA driver.

A logic error when using the Broadcom Netxtreme HCA driver could lead to
an out-of-bounds memory access. A local attacker could use this flaw to
escalate privileges.


* CVE-2024-50218: Denial-of-service in OCFS2 file system driver.

A missing check when using the OCFS2 file system driver could lead to a
kernel assertion failure. A local attacker could use this flaw to cause
a denial-of-service.


* CVE-2024-50251: Denial-of-service in Network packet filtering framework (Netfilter) driver.

A missing check when using the Network packet filtering framework
(Netfilter) driver could lead to a kernel assertion failure. A local
attacker could use this flaw to cause a denial-of-service.


* CVE-2024-53057: Privilege escalation in network QoS/scheduling driver.

A logic error when using the network QoS/scheduling driver could lead to
a use-after-free. A local attacker could use this flaw to escalate
privileges.


* Note: Oracle has determined some CVEs are not applicable.

The kernel is not affected by the following CVEs
since the code under consideration is not compiled.

CVE-2024-38545, CVE-2024-40953, CVE-2024-46849, CVE-2024-46852,
CVE-2024-46853, CVE-2024-46854, CVE-2024-47695, CVE-2024-47699,
CVE-2024-47712, CVE-2024-47723, CVE-2024-47735, CVE-2024-47740,
CVE-2024-47747, CVE-2024-47756, CVE-2024-47757, CVE-2024-49852,
CVE-2024-49871, CVE-2024-49879, CVE-2024-49900, CVE-2024-49902,
CVE-2024-49903, CVE-2024-49924, CVE-2024-49933, CVE-2024-49962,
CVE-2024-49981, CVE-2024-49985, CVE-2024-49997, CVE-2024-50031,
CVE-2024-50059, CVE-2024-50062, CVE-2024-50086, CVE-2024-50089,
CVE-2024-50096, CVE-2024-50103, CVE-2024-50116, CVE-2024-50168,
CVE-2024-50171, CVE-2024-50180, CVE-2024-50181, CVE-2024-50188,
CVE-2024-50193, CVE-2024-50196, CVE-2024-50198, CVE-2024-50202,
CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233,
CVE-2024-50244, CVE-2024-50245, CVE-2024-50247

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list