[El-errata] New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2024-12150)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Fri Feb 16 08:22:37 UTC 2024


Synopsis: ELSA-2024-12150 can now be patched using Ksplice
CVEs: CVE-2021-44879 CVE-2023-0590 CVE-2023-1077 CVE-2023-25775 CVE-2023-45863 CVE-2023-51780 CVE-2023-51781 CVE-2023-51782 CVE-2023-6246 CVE-2023-6932

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12150.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12150.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-0590: Use-after-free in network scheduler.

A race condition in net scheduler when dropping the reference of a queue
discipline object in qdisc_graft() may lead to a use-after-free. A local
user could use this flaw to cause a denial-of-service.


* CVE-2023-1077: Memory Corruption in Real-Time Scheduling Class.

Incorrect error checking logic in the Real-Time Scheduling Class can lead to
memory corruption. This can allow a local user to cause denial-of-service or
escalate privileges.

Orabug: 35181559


* CVE-2023-45863: Out-of-bounds write in a library routine for handling generic kernel objects.

Handling of internal kernel objects can race, leading to an
out-of-bounds write. An attacker with root access can exploit
this to cause denial-of-service or aid in other types of attacks.


* CVE-2023-6932: Use-after-free in IGMP networking stack.

A use-after-free error was found in the IGMP networking stack when
receiving query message if the device is down. A local attacker can
exploit this to cause a denial-of-service or privilege escalation.


* Note: Oracle will not provide a zero-downtime update for CVE-2021-44879.

Oracle has determined that the vulnerability does not affect a running
system.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-51782.

Oracle has determined that the vulnerability does not affect a running
system.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-51781.

Oracle has determined that the vulnerability does not affect a running
system.


* CVE-2023-51780: Use-after-free in the ATM driver's message receive path.

A race condition in the Asynchronous Transfer Mode network driver's
receive path can lead to a use-after-free.  This flaw could allow a
local attacker to leak privileged information from the kernel, or to
cause a denial-of-service.


* Denial-of-service when using InfiniBand driver.

Due to improper handling of disconnection requests in a specific case,
the RDMA connections will be blocked until a timeout is reached. A
local attacker can exploit this to cause a denial-of-service.

Orabug: 36143229


* Performance regression due to incorrect calculation by fair scheduler.

Not taking into account the offline state of a CPU causes incorrect
load calculation while scheduling, leading to a performance hit as
less CPU time is allotted to processes.

Orabug: 36185208


* CVE-2023-25775: Information disclosure in the Intel(R) Ethernet Controller RDMA driver.

A flaw in irdma allows to program zero-length STAGs in hardware. An
attacker could use this flaw to access sensitive kernel information.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list