[Ksplice][Ubuntu-22.04-Updates] New Ksplice updates for Ubuntu 22.04 Jammy (USN-6416-1)
Oracle Ksplice
quentin.casasnovas at oracle.com
Wed Oct 25 14:14:41 UTC 2023
Synopsis: USN-6416-1 can now be patched using Ksplice
CVEs: CVE-2023-1206 CVE-2023-20569 CVE-2023-2156 CVE-2023-3338 CVE-2023-38432 CVE-2023-3863 CVE-2023-3865 CVE-2023-3866 CVE-2023-4132 CVE-2023-4155 CVE-2023-4194 CVE-2023-4273 CVE-2023-44466 CVE-2023-4911
Systems running Ubuntu 22.04 Jammy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-6416-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 22.04
Jammy install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-4911: Buffer overflow in the GNU C Library's dynamic loader while processing environment variables.
Incorrect processing of environment variables in the GNU C Library's
dynamic loader ld.so can result in buffer overflow. This flaw could
allow a local attacker to elevate their privileges when launching
binaries with SUID permission.
* CVE-2023-2156: Insufficient input validation in IPv6 RPL Source Routing.
Insufficient input validation in IPv6 RPL Source Routing can lead to an
assertion failure. This can allow a remote unauthenticated attacker to
create a denial-of-service.
* CVE-2023-4132: Use-after-free in Siano MDTV receiver driver.
A logic error in the smsusb driver can lead to a use-after-free
scenario. This flaw could be exploited by an unprivileged local
attacker to cause a denial-of-service.
* CVE-2023-4194: Permission bypass when using TUN/TAP device driver.
Usage of an incorrect permission attribute when opening a TAP or TUN
device could lead to a permission bypass. A local attacker could use
this flaw to bypass network filters and gain unauthorized access.
Note: this updates improves the fix for CVE-2023-1076 which was
incorrect.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-20569.
Oracle has determined that patching CVE-2023-20569 on a running system
would not be safe and recommends a reboot.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-1206.
Oracle has determined that patching CVE-2023-1206 on a running system
would not be safe and recommends a reboot.
* CVE-2023-3863: Use-after-free in Near Field Communication support.
A race condition in the NFC subsystem could lead to a use-after-free
when unregistering a device. A local user with special privileges could
exploit this flaw to expose kernel sensitive information.
* CVE-2023-4273: Out-of-bounds memory access in exFAT.
Improper bounds checking in the exFAT driver when extracting the uni name
of a file from the directory index could lead to a stack overflow. A
local privileged attacker could use this flaw to execute arbitrary code
on the system.
* CVE-2023-3338: Denial-of-Service in DECnet.
Improperly initialized reference counter in DECnet may lead to a null
pointer dereference when sending a Hello message to a local DECnet
socket. A remote attacker could use this flaw to crash the system.
* CVE-2023-38432: Out-of-bounds memory access in KSMBD.
Improperly validated command payload size in KSMBD could lead to an
out-of-bounds memory read. A remote attacker could use this flaw to
cause a denial-of-service.
* CVE-2023-3865, CVE-2023-3866: Denial-of-service in KSMBD.
Insufficient parameter validation in KSMBD could lead to an
out-of-bounds memory read or a null-pointer-dereference. A remote
attacker could use this to cause a denial-of-service or possibly expose
sensitive kernel information.
* CVE-2023-44466: Out-of-bounds memory access in Ceph file system messenger protocol.
An integer signedness error in the Ceph file system messenger protocol
when processing HELLO or AUTH frames could lead to a buffer overflow. A
remote attacker could use this flaw to execute arbitrary code.
* Note: Oracle will not provide a zero-downtime update for CVE-2023-4155.
Oracle has determined that patching CVE-2023-4155 on a running system
would not be safe and recommends a reboot.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-22.04-updates
mailing list