[El-errata] New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2024-12611)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed Sep 18 18:47:29 UTC 2024
Synopsis: ELSA-2024-12611 can now be patched using Ksplice
CVEs: CVE-2023-4244 CVE-2023-52796 CVE-2024-36016 CVE-2024-36286 CVE-2024-36484 CVE-2024-38558 CVE-2024-38578 CVE-2024-38599 CVE-2024-38618 CVE-2024-38659 CVE-2024-39276 CVE-2024-39488
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2024-12611.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2024-12611.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-52796: Out-of-bounds access in IP-VLAN driver.
Improper usage of stack space when using the IP-VLAN driver could lead
to an out-of-bounds memory access. A local attacker could potentially
use this flaw to cause memory corruption, arbitrary code execution, or
to leak privileged information.
* CVE-2024-36016: Privilege escalation in GSM MUX line discipline driver.
A missing check when using the GSM MUX line discipline driver could lead
to an out-of-bounds memory access. A local attacker could use this flaw
to escalate privileges.
* CVE-2024-36286: Denial-of-service in netfilter subsystem.
A missing read lock in the netfilter subsystem, when unbinding a program
from a specific queue, could lead to flushing in an incorrect way. A
local attacker could use this flaw to cause a denial-of-service.
* CVE-2024-36484: Denial-of-service in TCP/IP networking.
A logic error in the kernel's TCP/IP networking implementation could
lead to a kernel assertion failure. A local attacker could use this
flaw to cause a denial-of-service.
* CVE-2024-38558: Denial-of-service in Open vSwitch driver.
A logic error when using the Open vSwitch driver could lead to a
destination address being partially zeroed out. A local attacker could
use this flaw to cause a denial-of-service.
* CVE-2024-38578: Information leak in Linux filesystem encryption layer.
A logic error when using the Linux filesystem encryption layer could
lead to an out-of-bounds memory write. A local attacker could use this
flaw to extract sensitive information.
* CVE-2024-38599: Disk corruption in JFFS2 filesystem.
A missing check when using the JFFS2 filesystem could lead to an
out-of-bounds memory write. A local attacker could use this flaw to
cause disk corruption.
* CVE-2024-38618: Denial-of-service in the core sound subsystem (ALSA).
A missing check in the timer code of the core sound subsystem (ALSA)
could lead to tasks being stalled. A local attacker could use this
flaw to cause a denial-of-service.
* CVE-2024-38659: Information leak in Cisco VIC Ethernet driver.
A missing check when using the Cisco VIC Ethernet driver could lead to
an out-of-bounds memory read. A local attacker could use this flaw to
extract sensitive information.
* CVE-2024-39276: Resource leak in ext4 filesystem.
Incorrect reference counting when using the ext4 filesystem could lead
to a reference count leak. A local attacker could use this flaw to cause
a denial-of-service.
* Soft lockups while processing PARENT_WATCHED inode flags.
Lock contention when performing certain operations related to the
PARENT_WATCHED inode flag can lead to soft lockups. This flaw degrades
performance on running systems.
Orabug: 36922242
* Note: Oracle has determined CVE-2024-39488 is not applicable.
An unaligned bug entry structure (used for detecting bugs), caused by a
conditional definition in core Arm64 code, can lead to a kernel crash
while fetching entries for modules. A local attacker can exploit this
flaw to cause a denial-of-service.
The kernel is not affected by CVE-2024-39488 since the condition
(CONFIG_DEBUG_BUGVERBOSE=n) required for the bad definition does
not exist.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-4244.
A race condition in the set implementation of nftables between
the control plane and the garbage collection worker could lead to a
use-after-free. A local user with CAP_NET_ADMIN access could use this
flaw to cause a crash or expose sensitive kernel information.
Oracle has determined that patching CVE-2023-4244 on a running system
would not be safe and recommends a reboot.
On workloads that permit it, a temporary mitigation is to disallow
unprivileged users from creating namespaces:
sudo sysctl -w kernel.unprivileged_userns_clone=0
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-38627, CVE-2024-38633, CVE-2024-38634, CVE-2024-38637,
CVE-2024-38780, CVE-2024-39292, CVE-2024-39489, CVE-2024-40968
Orabug: 36952386
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list