[El-errata] New Ksplice updates for RHCK 6 (ELSA-2024-1831)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu May 23 11:55:41 UTC 2024
Synopsis: ELSA-2024-1831 can now be patched using Ksplice
CVEs: CVE-2023-31436 CVE-2023-3611 CVE-2023-3776 CVE-2023-4921
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-1831.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-1831.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 6 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-3611: Privilege escalation in QFQ network scheduler.
An arithmetic error in the Quick Fair Queueing network scheduler can
lead to an out-of-bounds write. This flaw can be exploited by a local
attacker to escalate their privilege.
Orabug: 36517546
* CVE-2023-3776: Privilege escalation in Netfilter packet marking driver.
A reference counting error in the Netfilter packet marking
implementation can lead to a use-after-free. This flaw could be
leveraged by a local attacker to escalate their privilege.
* CVE-2023-31436: Out-of-bounds memory access in sch_qfq driver.
An arithmetic error in the sch_qfq driver can lead to an out-of-bounds
memory access. A local attacker could exploit this flaw to leak
sensitive information or to cause other undefined behavior.
* CVE-2023-4921: Use-after-free in QFQ packet scheduler.
The Quick Fair Queueing packet scheduling algorithm did not properly handle
network packets in some situations, leading to a use-after-free. A local
user could use this flaw to cause a denial-of-service or potentially
execute arbitrary code.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list