[El-errata] New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2024-12110)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Feb 7 09:10:28 UTC 2024


Synopsis: ELSA-2024-12110 can now be patched using Ksplice
CVEs: CVE-2020-26555 CVE-2021-33098 CVE-2023-1077 CVE-2023-42752 CVE-2023-4921

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12110.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12110.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-4921: Use-after-free in QFQ packet scheduler.

The Quick Fair Queueing packet scheduling algorithm did not properly handle
network packets in some situations, leading to a use-after-free. A local
user could use this flaw to cause a denial-of-service or potentially
execute arbitrary code.


* CVE-2023-42752: Out-of-bounds memory access in TCP/IP networking.

Insufficient checks for integer overflow when allocating a socket buffer
could lead to an out-of-bounds memory write. A local user could use this
flaw for arbitrary code execution.


* CVE-2023-1077: Memory Corruption in Real-Time Scheduling Class.

Incorrect error checking logic in the Real-Time Scheduling Class can lead to
memory corruption. This can allow a local user to cause denial-of-service or
escalate privileges.


* CVE-2020-26555: Permission bypass from an unauthorized nearby Bluetooth device.

Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification
1.0B through 5.2 may permit an unauthenticated nearby device to spoof
the BD_ADDR of the peer device to complete pairing without knowledge
of the PIN.

Orabug: 35959598


* CVE-2021-33098: Denial-of-service when setting MTU in the Intel(R) Ethernet ixgbe driver.

Improper input validation of MTU value in the Intel(R) Ethernet ixgbe
driver could lead to an out-of-bounds access. A local attacker could use
this flaw to cause a denial-of-service.

Orabug: 33752821

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list