[El-errata] New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2024-12582)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Sep 16 15:15:09 UTC 2024
Synopsis: ELSA-2024-12582 can now be patched using Ksplice
CVEs: CVE-2024-26583 CVE-2024-36016 CVE-2024-36286 CVE-2024-36489 CVE-2024-38552 CVE-2024-38558 CVE-2024-38578 CVE-2024-38580 CVE-2024-38586 CVE-2024-38599 CVE-2024-38618 CVE-2024-38659 CVE-2024-39276 CVE-2024-39488 CVE-2024-39490 CVE-2024-39493 CVE-2024-39503 CVE-2024-42102
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12582.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12582.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2024-36286: Denial-of-service in netfilter subsystem.
Missing read lock in the netfilter subsystem when unbinding a program
from a specific queue could lead to flushing in an incorrect way. A
local attacker could use this flaw to cause a denial-of-service.
* CVE-2024-36489: Denial-of-service in Transport Layer Security support.
A race condition when initializing Upper Layer Protocols (ULPs) over TCP
sockets for Transport Layer Security support could lead to a NULL
pointer dereference. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2024-38552: Memory corruption in AMD Display Core driver.
A missing check when using the color transformation function in the AMD Display
Core driver could lead to a buffer overflow. A local attacker could use this
flaw to cause memory corruption.
* CVE-2024-38558: Denial-of-service in Open vSwitch driver.
A logic error when using Open vSwitch driver could lead to the destination
address being partially zeroed out. A local attacker could use this flaw to
cause a denial-of-service.
* CVE-2024-38578: Information leak in Linux filesystem encryption layer.
A logic error in the in-kernel key management subsystem of the filesystem
encryption layer could lead to an out-of-bounds memory write. A local attacker
could use this flaw to extract sensitive information.
* CVE-2024-38580: Denial-of-service in epoll.
A race condition when using epoll could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a denial-of-
service.
* CVE-2024-38586: Memory corruption in Realtek 8169/8168/8101/8125 ethernet driver.
A logic error when using Realtek 8169/8168/8101/8125 ethernet driver
could possibly lead to ring buffer corruption and NULL pointer
dereference. A local attacker could use this flaw to cause
denial-of-service.
* CVE-2024-38599: Disk corruption in JFFS2 filesystem.
A missing check when using the JFFS2 filesystem could lead to an out-of- bounds
memory write. A local attacker could use this flaw to cause disk corruption.
* CVE-2024-38618: Denial-of-service in the core sound subsystem (ALSA).
A missing check in the timer code of the core sound subsystem (ALSA)
could lead to tasks being stalled. A local attacker could use this
flaw to cause a denial-of-service.
* CVE-2024-38659: Information leak in Cisco VIC Ethernet driver.
A missing check when using the Cisco VIC Ethernet driver could lead to an
out-of-bounds memory read. A local attacker could use this flaw to extract
sensitive information.
* CVE-2024-39276: Resource leak in ext4 filesystem.
Incorrect reference counting in the ext4 filesystem could lead to a reference
count leak. A local attacker could use this flaw to cause a denial-of-service.
* CVE-2024-39490: Denial-of-service in IPv6 Segment Routing.
A logic error when adding the Segment Routing Header to an IPv6 packet could
lead to a memory leak. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2024-39493: Denial-of-service in Cryptographic API using Intel QAT.
A logic error in the Cryptographic API using Intel QuickAssist Technology could
lead to a memory leak. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2024-39503: Privilege escalation in netfilter (IP set) subsystem.
A race condition when using netfilter (IP set) subsystem could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.
* CVE-2024-42102: Memory corruption in kernel memory manager.
Incorrect cast of a divisor when setting dirty page writeback limits in the
memory management subsystem could lead to divide-by-zero. A local attacker
could use this flaw to cause denial-of-service.
* Inhibited APIC acceleration with legacy guests.
Incorrect logic in the local APIC virtualization can lead to high latency for
VFIO network devices.
Orabug: 36967641
* Interrupt Latency in KVM APICv.
When KVM APIC acceleration is inhibited, guests can experience spurious
interrupts and interrupt latency.
Orabug: 36967640
* Note: Oracle has determined CVE-2024-36016 is not applicable.
A logic error when using GSM 07.10 tty multiplexor could lead to a
buffer overflow. A local attacker could use this flaw to escalate
privileges.
The exploit for this CVE requires attaching to the line
discipline which requires CAP_NET_ADMIN privileges.
* Note: Oracle has determined CVE-2024-39488 is not applicable.
Unaligned bug entry structure (used for detecting bugs) due to
conditional definition in core Arm64 code can lead to a kernel
crash while fetching entries for modules. A local attacker can
exploit this flaw to cause a denial-of-service.
The kernel is not affected by CVE-2024-39488 since the condition
(CONFIG_DEBUG_BUGVERBOSE=n) required for the bad definition does
not exist.
* Note: Oracle will not provide a zero-downtime fix for CVE-2024-26583.
Oracle has determined that patching CVE-2024-26583 at runtime would
not be safe and recommends rebooting to resolve the issue.
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-33847, CVE-2024-34027, CVE-2024-34777, CVE-2024-35247,
CVE-2024-36965, CVE-2024-38381, CVE-2024-38547, CVE-2024-38548,
CVE-2024-38549, CVE-2024-38550, CVE-2024-38571, CVE-2024-38583,
CVE-2024-38587, CVE-2024-38589, CVE-2024-38590, CVE-2024-38591,
CVE-2024-38607, CVE-2024-38613, CVE-2024-38623, CVE-2024-38624,
CVE-2024-38633, CVE-2024-38634, CVE-2024-38637, CVE-2024-38661,
CVE-2024-38780, CVE-2024-39277, CVE-2024-39292, CVE-2024-39466,
CVE-2024-39467, CVE-2024-39489
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list