[Ksplice][Ubuntu-21.04-Updates] New Ksplice updates for Ubuntu 21.04 Hirsute (USN-5070-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Oct 22 01:42:22 PDT 2021
Synopsis: USN-5070-1 can now be patched using Ksplice
CVEs: CVE-2020-26541 CVE-2021-22543 CVE-2021-33624 CVE-2021-34693 CVE-2021-35039 CVE-2021-3609 CVE-2021-3612 CVE-2021-3653 CVE-2021-3656 CVE-2021-38200 CVE-2021-38206 CVE-2021-38207
Systems running Ubuntu 21.04 Hirsute can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-5070-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 21.04
Hirsute install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2021-34693: Information leak in CAN BCM message.
The header of a CAN bus BCM message contains uninitialized memory that
is transmitted over the wire. A malicious device might exploit this to
gain information about the running system.
* Note: Oracle will not be providing an update for CVE-2020-26541.
This CVE is only applicable at boot time, so by the time Ksplice live updates
are applied, the relevant code has already ran.
* Note: Oracle has determined that CVE-2021-35039 is not applicable.
The kernel is not affected by CVE-2021-35039 since the code under
consideration is not compiled.
* CVE-2021-22543: Privilege escalation in KVM due to RO page check bypass.
The reference counts of VM_IO|VM_PFNMAP pages can be manipulated to
cause a deliberate use-after-free. This can be manipulated to cause
writes to arbitrary memory pages, allowing a malicious user with the
ability to create virtual machines to escalate their privileges.
* CVE-2021-3612: Privilege escalation in joystick subsystem due to out-of-bounds write access.
Improper data validation in ioctls of joystick devices subsystem could
lead to out-of-bounds memory write access. A local user could use this
flaw to cause a denial-of-service or escalate their privileges.
* CVE-2021-3609: Privilege escalation in CAN BCM due to use-after-free.
A race condition in the CAN BCM implementation could lead to use-after-free
vulnerability. A local attacker could potentially use this to execute
arbitrary code.
* CVE-2021-33624: Information disclosure in BPF due to type confusion.
A type confusion flaw in Berkeley Packet Filter could lead to a branch
misprediction and consequently an unprivileged BPF program can read
arbitrary memory locations via a side-channel attack.
* CVE-2021-38206: Remote denial-of-service when using mac80211 subsystem.
A missing check when receiving frames over 5GHz wireless could lead to a
denial-of-service. A physically proximate attacker could use this flaw
to cause a denial-of-service.
* CVE-2021-38207: Denial-of-service when using Xilinx LL TEMAC driver.
An invalid check when using Xilinx LL TEMAC driver could lead to a
buffer overflow. A remote attacker could use this flaw to cause a
denial-of-service.
* Note: Oracle will not be providing an update for CVE-2021-38200.
CVE-2021-38200 is only impacting powerpc architecture.
* CVE-2021-3656, CVE-2021-3653: Privilege escalation in the AMD SVM L2 guests handling.
Multiple security bypasses potentially allow L2 guests to read/write host
physical memory. An untrusted L1 guest running on certain AMD CPUs could
use these flaws to run with full ring zero privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-21.04-updates
mailing list