[Ksplice][Ubuntu-22.04-Updates] New Ksplice updates for Ubuntu 22.04 Jammy (USN-5624-1)

Julian Pidancet julian.pidancet at oracle.com
Mon Jan 30 15:48:10 UTC 2023


Synopsis: USN-5624-1 can now be patched using Ksplice
CVEs: CVE-2021-33655 CVE-2022-2318 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 CVE-2022-33743 CVE-2022-34494 CVE-2022-34495 CVE-2022-36946

Systems running Ubuntu 22.04 Jammy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-5624-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 22.04
Jammy install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2022-36946: Denial-of-service in Netfilter.

A missing sanity check in nfqnl_mangle() when a special netfilter rule
is present could result in a corrupted socket buffer. A remote attacker
could use this flaw for a denial-of-service.


* CVE-2022-2318: Privilege escalation in X.25 Packet Layer Protocol.

Improper reference counting in X.25 Packet Layer Protocol (Rose) could
lead to a use-after-free. A local unprivileged user could use this flaw
for privilege escalation.


* CVE-2021-33655: Out-of-bounds memory access in framebuffer console driver.

A missing sanity check in the famebuffer-based console driver when
changing font size or configuring screen size could result in an
out-of-bounds memory write. A local user could use this flaw to escalate
privileges.


* CVE-2022-34494, CVE-2022-34495: Double-free in Virtio RPMSG bus driver.

Multiple flaws in the Virtio RPMSG bus driver, in
rpmsg_virtio_add_ctrl_dev and rpmsg_probe, could lead to a double-free.
A local attacker could use this flaw to cause a denial-of-service or
execute arbitrary code.


* CVE-2022-33743, XSA-405: Use-after-free in Xen network frontend driver.

A flaw in the Xen network frontend driver could lead to a use-after-free
when processing responses from a misbehaving backend. An attacker
controlling the network backend domain could use this flaw to cause a
denial-of-service or execute arbitrary code in a different domain.


* Oracle will not provide a zero-downtime update for XSA-403, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742.

Oracle has determined that live patching XSA-403, CVE-2022-26365,
CVE-2022-33740, CVE-2022-33741, CVE-2022-33742 on a running system would
not be safe. Improperly zeroed memory regions in Xen PV drivers
(blkfront, netfront) shared with the backend domain (dom0) could lead to
an information leak.
Hosts not using Xen or PV drivers are not affected.
Hosts using PV drivers with a trusted backend domain are not affected.
Oracle recommends a reboot to mitigate these issues if the host is
affected.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-22.04-updates mailing list