[El-errata] New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2024-12110)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed Feb 7 09:10:28 UTC 2024
Synopsis: ELSA-2024-12110 can now be patched using Ksplice
CVEs: CVE-2020-26555 CVE-2021-33098 CVE-2023-1077 CVE-2023-42752 CVE-2023-4921
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12110.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12110.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-4921: Use-after-free in QFQ packet scheduler.
The Quick Fair Queueing packet scheduling algorithm did not properly handle
network packets in some situations, leading to a use-after-free. A local
user could use this flaw to cause a denial-of-service or potentially
execute arbitrary code.
* CVE-2023-42752: Out-of-bounds memory access in TCP/IP networking.
Insufficient checks for integer overflow when allocating a socket buffer
could lead to an out-of-bounds memory write. A local user could use this
flaw for arbitrary code execution.
* CVE-2023-1077: Memory Corruption in Real-Time Scheduling Class.
Incorrect error checking logic in the Real-Time Scheduling Class can lead to
memory corruption. This can allow a local user to cause denial-of-service or
escalate privileges.
* CVE-2020-26555: Permission bypass from an unauthorized nearby Bluetooth device.
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification
1.0B through 5.2 may permit an unauthenticated nearby device to spoof
the BD_ADDR of the peer device to complete pairing without knowledge
of the PIN.
Orabug: 35959598
* CVE-2021-33098: Denial-of-service when setting MTU in the Intel(R) Ethernet ixgbe driver.
Improper input validation of MTU value in the Intel(R) Ethernet ixgbe
driver could lead to an out-of-bounds access. A local attacker could use
this flaw to cause a denial-of-service.
Orabug: 33752821
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list