[Ksplice][EL9-Updates] New Ksplice updates for OL 9 and RHEL 9 (RHSA-2022:6003)

Alex Thorlton alex.thorlton at oracle.com
Thu Sep 15 12:29:47 UTC 2022


Synopsis: RHSA-2022:6003 can now be patched using Ksplice
CVEs: CVE-2022-0494 CVE-2022-1055

Systems running RHCK on Oracle Linux 9 and Red Hat Enterprise Linux 9
can now use Ksplice to patch against the latest Red Hat Security
Advisory, RHSA-2022:6003.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running OL 9 and RHEL 9
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-1055: Use-after-free in Packet classifier API.

A missing cleanup of variables when creating an new filter in Packet
classifier API could lead to a use-after-free. A local user could use
this flaw to cause a denial-of-service or code execution.


* CVE-2022-0494: Information disclosure in block layer subsystem.

A flaw in ioctls of the block layer subsystem could result in improper
memory initialization. A local user could use this flaw for information
disclosure.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-EL9-updates mailing list