[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (ELSA-2021-1093)

Alex Thorlton alex.thorlton at oracle.com
Wed Apr 14 13:43:29 PDT 2021

Synopsis: ELSA-2021-1093 can now be patched using Ksplice
CVEs: CVE-2020-27152 CVE-2020-28374 CVE-2021-26708 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-3347

Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat kernel update,
More information about this errata can be found at


We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


* CVE-2021-27363, CVE-2021-27364, CVE-2021-27365: Priviledge escalation in iSCSI subsystem.

Multiple logic errors failing to check some messages and sysfs
attribute sizes may cause a buffer overflow.  A local attacker could
use this to cause a priviledge escalation.

Orabug: 32603381

* CVE-2021-26708: Privilege escalation in Virtual Socket protocol due to bad locking.

Wrong locking in Virtual Socket protocol implementation could lead to
a race condition. A local user could use this flaw for privilege

* CVE-2020-27152: Denial-of-service in virtualized IOAPIC driver.

A logic error when handling interrupt in the virtualized IOAPIC driver
could lead to an infinite loop on the hypervisor. A local attacker from
a guest could use this flaw to cause a denial-of-service.

* CVE-2021-3347: Privilege escalation in the Fast Userspace Mutexes.

A flaw in the Fast Userspace Mutexes implementation could lead to
a use-after-free. A local user could use this flaw to crash the system
or escalate their privileges.

* CVE-2020-28374: Access control bypass when reading or writing TCM devices.

Lack of validation against the session's list when matching a Target Core
Mod (TCM) device during an eXtended COPY (XCOPY) operation leads to access
control bypass.  Attackers with access to one device could read and write
from/to other devices they should not have access to.


Ksplice support is available at ksplice-support_ww at oracle.com.

More information about the Ksplice-EL8-updates mailing list