[Ksplice][RHEL9-Updates] New Ksplice updates for RHEL 9 (RHSA-2022:6003)

Alex Thorlton alex.thorlton at oracle.com
Thu Sep 15 12:33:19 UTC 2022


Synopsis: RHSA-2022:6003 can now be patched using Ksplice
CVEs: CVE-2022-0494 CVE-2022-1055

Systems running Red Hat Enterprise Linux 9 can now use Ksplice to
patch against the latest Red Hat Security Advisory, RHSA-2022:6003.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHEL 9 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-1055: Use-after-free in Packet classifier API.

A missing cleanup of variables when creating an new filter in Packet
classifier API could lead to a use-after-free. A local user could use
this flaw to cause a denial-of-service or code execution.


* CVE-2022-0494: Information disclosure in block layer subsystem.

A flaw in ioctls of the block layer subsystem could result in improper
memory initialization. A local user could use this flaw for information
disclosure.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-RHEL9-Updates mailing list