[Ksplice][Ubuntu-20.04-Updates] New Ksplice updates for Ubuntu 20.04 Focal (USN-7293-1)
Oracle Ksplice
gregory.herrero at oracle.com
Tue Mar 18 15:43:38 UTC 2025
Synopsis: USN-7293-1 can now be patched using Ksplice
CVEs: CVE-2023-52458 CVE-2024-35896 CVE-2024-35962 CVE-2024-38544 CVE-2024-41016 CVE-2024-47670 CVE-2024-47674 CVE-2024-47685 CVE-2024-47692 CVE-2024-47701 CVE-2024-47706 CVE-2024-47723 CVE-2024-47742 CVE-2024-49860 CVE-2024-49867 CVE-2024-49868 CVE-2024-49878 CVE-2024-49882 CVE-2024-49883 CVE-2024-49900 CVE-2024-49944 CVE-2024-49948 CVE-2024-49949 CVE-2024-49957 CVE-2024-49958 CVE-2024-49966 CVE-2024-49982 CVE-2024-49995 CVE-2024-50033 CVE-2024-50035 CVE-2024-50045 CVE-2024-50076 CVE-2024-50142 CVE-2024-50151 CVE-2024-50179 CVE-2024-50195 CVE-2024-50199 CVE-2024-50210 CVE-2024-50218 CVE-2024-50251 CVE-2024-50265 CVE-2024-50273 CVE-2024-50278 CVE-2024-50279 CVE-2024-50301 CVE-2024-50302 CVE-2024-53063 CVE-2024-53104
Systems running Ubuntu 20.04 Focal can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-7293-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 20.04
Focal install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-52458: Denial-of-service in the block layer.
Incorrect error checking in the kernel's block layer support when
adding or resizing a partition could lead to an IO error or null
pointer dereference. A privileged local user could use this flaw
to cause a denial-of-service.
* CVE-2024-35896, CVE-2024-35962: Memory corruption in Netfilter.
A missing check on user input when operating on socket options in Netfilter
driver could lead to an out-of-bounds memory access. A local attacker
could use this flaw to cause memory corruption.
* CVE-2024-38544: Denial-of-service in Software RDMA over Ethernet (RoCE) driver.
A race condition when using the Software RDMA over Ethernet (RoCE)
driver could lead to a use-after-free. An attacker could use this flaw
to cause a denial-of-service.
* CVE-2024-41016, CVE-2024-47670: Privilege escalation in OCFS2 filesystem.
Missing checks when reading extended attributes in the OCFS2 filesystem
could lead to an out-of-bounds memory access. A local attacker could use
a crafted image to escalate privileges.
* CVE-2024-47674: Privilege escalation in MMU-based Paged Memory Management driver.
A logic error in the MMU-based Paged Memory Management driver could lead
to use of uninitialized memory. A local attacker could use this flaw to
escalate privileges.
* CVE-2024-47685: Remote information leak in IPv6 packet rejection driver.
A missing check when using the IPv6 packet rejection driver could lead
to use of uninitialized memory. A remote attacker could use this flaw to
extract sensitive information.
* CVE-2024-47692: Denial-of-service in NFS server driver.
A missing check when using the NFS server driver could lead to a NULL
pointer dereference. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2024-47701: Privilege escalation in ext4 filesystem.
A race condition when using the ext4 filesystem could lead to an
out-of-bounds memory access. A local attacker could use this flaw to
escalate privileges.
* CVE-2024-47706: Privilege escalation in generic block I/O layer.
A missing check when using the generic block I/O layer could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.
* CVE-2024-47723: Information leak in JFS.
Missing checks in the JFS filesystem driver could lead to an
out-of-bounds access. A local attacker could use this flaw to
leak sensitive information or cause a denial-of-service.
* CVE-2024-47742: Privilege escalation in the firmware loader driver.
A missing check when user loads a firmware using firmware loader driver
indirectly could lead to loading arbitrary files. A local attacker could
use this flaw to escalate privileges.
* CVE-2024-49860: Information leak in ACPI driver.
A missing check when using the ACPI driver could lead to an
out-of-bounds memory read. A local attacker could use this flaw to
extract sensitive information.
* CVE-2024-49867: Privilege escalation in BTRFS filesystem.
A missing flush when unmounting the BTRFS filesystem could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.
* CVE-2024-49868: Denial-of-service in BTRFS filesystem.
A missing check when using the BTRFS filesystem could lead to a NULL
pointer dereference. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2024-49878: Information leak in kernel resource manager with CXL memory.
A logic error in the kernel resource manager when CXL memory is in use
could lead to accessing normally restricted part of the memory. A local
attacker could use this flaw to leak sensitive information.
* CVE-2024-49882: Code execution in ext4 filesystem.
A logic error in the ext4 filesystem could lead to a double free. A
local attacker could use this flaw to execute arbitrary code in kernel
mode.
* CVE-2024-49883: Privilege escalation in ext4 filesystem.
A logic error when using the ext4 filesystem could lead to a
use-after-free. A local attacker could use this flaw to escalate
privileges.
* CVE-2024-49900: Information leak in JFS.
A logic error in the JFS filesystem driver could lead to
using an uninitialized buffer when working with extended
attributes. A local attacker could use this flaw to leak
sensitive information from kernel space.
* CVE-2024-49944: Denial-of-service in SCTP Protocol driver.
A missing check when listening on a socket in the SCTP Protocol driver
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* CVE-2024-49948, CVE-2024-49949: Denial-of-service in core networking layer.
Missing checks on maliciously crafted packets from userspace could
cause an underflow leading to a NULL pointer dereference. A local
attacker could use this flaw to cause a denial-of-service.
* CVE-2024-49957: Denial-of-service in OCFS2 file system driver.
A logic error when mounting a filesystem with a corrupted journal in the
OCFS2 file system driver could lead to a NULL pointer dereference. A
local attacker could use this flaw to cause a denial-of-service.
* CVE-2024-49958: Denial-of-service in OCFS2 filesystem.
A logic error when using the OCFS2 filesystem could lead to disk
corruption, and a potential kernel panic. A local attacker could use this
flaw to corrupt a filesystem, or cause a denial-of-service.
* CVE-2024-49966: Privilege escalation in OCFS2 file system driver.
A logic error when reading information header from global quota file in
the OCFS2 file system driver could lead to a use-after-free. A local
attacker could use this flaw to escalate privileges.
* CVE-2024-49982: Use-after-free in ATA-over-Ethernet driver.
Due to incorrect handling of device refcount in the ATA-over-Ethernet
(AoE) driver, a race is possible between freeing of an AoE device and
access through associated socket buffers, leading to a use-after-free.
A local attacker can exploit this flaw to cause a denial-of-service or
execute arbitrary code.
* CVE-2024-49995: Privilege escalation in TIPC Protocol driver.
A logic error when setting TIPC bearer name in the TIPC Protocol driver
could lead to an out-of-bounds memory access. A local attacker could use
this flaw to escalate privileges.
* CVE-2024-50033: Privilege escalation in SLHC driver.
A logic error when using the Van Jacobson TCP/IP Serial Line Header
Compression (SLHC) driver could lead to an out-of-bounds memory access.
A local attacker could use this flaw to escalate privileges.
* CVE-2024-50035: Information leak in PPP (point-to-point protocol) networking stack.
A missing check when transmitting using the PPP networking stack could
lead to use of uninitialized memory. A local attacker could use this
flaw to extract sensitive information.
* CVE-2024-50045: Denial-of-service in bridge netfilter driver.
A logic error when sending traffic using the bridge netfilter driver
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* CVE-2024-50076: Information leak in virtual terminal driver.
A missing initialization of allocated memory when getting font
information in the virtual console driver could lead to use of
uninitialized memory. A local attacker could use this flaw to
extract sensitive information.
* CVE-2024-50142: Denial-of-service in transformation user configuration interface.
A logic error when using the transformation user configuration interface
could lead to an integer overflow. A local attacker could use this flaw
to cause a denial-of-service.
* CVE-2024-50151: Privilege escalation in SMB3 and CIFS driver.
A missing check when using the SMB3 and CIFS driver could lead to an
out-of-bounds memory access. A local attacker could use this flaw to
escalate privileges.
* CVE-2024-50179: Denial-of-service in Ceph distributed file system driver.
A logic error when setting dirty pages in the Ceph distributed file
system driver could lead to a kernel assertion failure. A local attacker
could use this flaw to cause a denial-of-service.
* CVE-2024-50195, CVE-2024-50210: Denial-of-service in dynamic POSIX clock driver.
A missing check when using the dynamic POSIX clock driver could lead to
invalid time being set. A local attacker could use this flaw to cause a
denial-of-service or other types of attacks (since other kernel parts or
drivers may depend on the set time).
* CVE-2024-50199: Resource leak in swap memory driver.
A missing check when running swapoff after a swapout of a hugeTLB page
could lead to big memory leaks. A local attacker could use this flaw to
cause a denial-of-service.
* CVE-2024-50218: Denial-of-service in OCFS2 file system driver.
A missing check when using the OCFS2 file system driver could lead to a
kernel assertion failure. A local attacker could use this flaw to cause
a denial-of-service.
* CVE-2024-50251: Denial-of-service in Network packet filtering framework (Netfilter) driver.
A missing check when using the Network packet filtering framework
(Netfilter) driver could lead to a kernel assertion failure. A local
attacker could use this flaw to cause a denial-of-service.
* CVE-2024-50265: Denial-of-service in OCFS2 filesystem driver.
A logic error when setting extended attributes in the OCFS2 filesystem
driver could lead to a NULL pointer dereference. A local attacker could
use this flaw to cause a denial-of-service.
* CVE-2024-50273: Denial-of-service in Btrfs filesystem driver.
A logic error when handling delayed reference counting in the Btrfs
filesystem driver could lead to a use-after-free. A local attacker could
use this flaw to cause a denial-of-service.
* CVE-2024-50278, CVE-2024-50279: Privilege escalation in Multiple Device Cache Target driver.
Logic errors when manipulating cache in the Multiple Device Cache Target
driver could lead to an out-of-bounds memory access. A local attacker
could use this flaw to escalate privileges.
* CVE-2024-50301: Privilege escalation in Keyring subsystem.
A missing check when checking if a key can be used in the Keyring
subsystem could lead to an out-of-bounds memory access. A local attacker
could use this flaw to escalate privileges.
* CVE-2024-50302: Information leak in HID bus driver.
A missing variable initialization when using the HID bus driver could
lead to use of uninitialized memory. A local attacker could use this
flaw to extract sensitive information.
* CVE-2024-53063: Denial-of-service in DVB core driver.
A logic error when using the DVB core driver could lead to a memory
leak. A local attacker could use this flaw to cause a denial-of-service.
* CVE-2024-53104: Privilege escalation in USB Video Class driver.
A missing check when using the UVC driver could lead to an out-of-bounds
memory write. A local attacker could use this flaw to escalate
privileges.
* Note: Oracle has determined some CVEs are not applicable.
The kernel is not affected by the following CVEs
since the code under consideration is not compiled.
CVE-2024-40953, CVE-2024-41066, CVE-2024-50168, CVE-2024-50269,
CVE-2024-50296
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-20.04-updates
mailing list