[Ksplice][Ubuntu-22.04-Updates] New Ksplice updates for Ubuntu 22.04 Jammy (USN-6416-1)

Oracle Ksplice quentin.casasnovas at oracle.com
Wed Oct 25 14:14:41 UTC 2023


Synopsis: USN-6416-1 can now be patched using Ksplice
CVEs: CVE-2023-1206 CVE-2023-20569 CVE-2023-2156 CVE-2023-3338 CVE-2023-38432 CVE-2023-3863 CVE-2023-3865 CVE-2023-3866 CVE-2023-4132 CVE-2023-4155 CVE-2023-4194 CVE-2023-4273 CVE-2023-44466 CVE-2023-4911

Systems running Ubuntu 22.04 Jammy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-6416-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 22.04
Jammy install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2023-4911: Buffer overflow in the GNU C Library's dynamic loader while processing environment variables.

Incorrect processing of environment variables in the GNU C Library's
dynamic loader ld.so can result in buffer overflow. This flaw could
allow a local attacker to elevate their privileges when launching
binaries with SUID permission.


* CVE-2023-2156: Insufficient input validation in IPv6 RPL Source Routing.

Insufficient input validation in IPv6 RPL Source Routing can lead to an
assertion failure. This can allow a remote unauthenticated attacker to
create a denial-of-service.


* CVE-2023-4132: Use-after-free in Siano MDTV receiver driver.

A logic error in the smsusb driver can lead to a use-after-free
scenario.  This flaw could be exploited by an unprivileged local
attacker to cause a denial-of-service.


* CVE-2023-4194: Permission bypass when using TUN/TAP device driver.

Usage of an incorrect permission attribute when opening a TAP or TUN
device could lead to a permission bypass. A local attacker could use
this flaw to bypass network filters and gain unauthorized access.
Note: this updates improves the fix for CVE-2023-1076 which was
incorrect.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-20569.

Oracle has determined that patching CVE-2023-20569 on a running system
would not be safe and recommends a reboot.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-1206.

Oracle has determined that patching CVE-2023-1206 on a running system
would not be safe and recommends a reboot.


* CVE-2023-3863: Use-after-free in Near Field Communication support.

A race condition in the NFC subsystem could lead to a use-after-free
when unregistering a device. A local user with special privileges could
exploit this flaw to expose kernel sensitive information.


* CVE-2023-4273: Out-of-bounds memory access in exFAT.

Improper bounds checking in the exFAT driver when extracting the uni name
of a file from the directory index could lead to a stack overflow. A
local privileged attacker could use this flaw to execute arbitrary code
on the system.


* CVE-2023-3338: Denial-of-Service in DECnet.

Improperly initialized reference counter in DECnet may lead to a null
pointer dereference when sending a Hello message to a local DECnet
socket. A remote attacker could use this flaw to crash the system.


* CVE-2023-38432: Out-of-bounds memory access in KSMBD.

Improperly validated command payload size in KSMBD could lead to an
out-of-bounds memory read. A remote attacker could use this flaw to
cause a denial-of-service.


* CVE-2023-3865, CVE-2023-3866: Denial-of-service in KSMBD.

Insufficient parameter validation in KSMBD could lead to an
out-of-bounds memory read or a null-pointer-dereference. A remote
attacker could use this to cause a denial-of-service or possibly expose
sensitive kernel information.


* CVE-2023-44466: Out-of-bounds memory access in Ceph file system messenger protocol.

An integer signedness error in the Ceph file system messenger protocol
when processing HELLO or AUTH frames could lead to a buffer overflow. A
remote attacker could use this flaw to execute arbitrary code.


* Note: Oracle will not provide a zero-downtime update for CVE-2023-4155.

Oracle has determined that patching CVE-2023-4155 on a running system
would not be safe and recommends a reboot.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-22.04-updates mailing list