[El-errata] New Ksplice updates for RHCK 6 (ELSA-2024-1831)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu May 23 11:55:41 UTC 2024


Synopsis: ELSA-2024-1831 can now be patched using Ksplice
CVEs: CVE-2023-31436 CVE-2023-3611 CVE-2023-3776 CVE-2023-4921

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-1831.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-1831.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHCK 6 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-3611: Privilege escalation in QFQ network scheduler.

An arithmetic error in the Quick Fair Queueing network scheduler can
lead to an out-of-bounds write.  This flaw can be exploited by a local
attacker to escalate their privilege.

Orabug: 36517546


* CVE-2023-3776: Privilege escalation in Netfilter packet marking driver.

A reference counting error in the Netfilter packet marking
implementation can lead to a use-after-free.  This flaw could be
leveraged by a local attacker to escalate their privilege.


* CVE-2023-31436: Out-of-bounds memory access in sch_qfq driver.

An arithmetic error in the sch_qfq driver can lead to an out-of-bounds
memory access.  A local attacker could exploit this flaw to leak
sensitive information or to cause other undefined behavior.


* CVE-2023-4921: Use-after-free in QFQ packet scheduler.

The Quick Fair Queueing packet scheduling algorithm did not properly handle
network packets in some situations, leading to a use-after-free. A local
user could use this flaw to cause a denial-of-service or potentially
execute arbitrary code.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list