[Ksplice][Ubuntu-22.10-Updates] New Ksplice updates for Ubuntu 22.10 Kinetic (USN-6024-1)
Oracle Ksplice
quentin.casasnovas at oracle.com
Wed Jul 5 11:47:26 UTC 2023
Synopsis: USN-6024-1 can now be patched using Ksplice
CVEs: CVE-2019-19082 CVE-2022-2873 CVE-2022-3424 CVE-2022-3534 CVE-2022-3606 CVE-2022-41218 CVE-2022-47929 CVE-2023-0615 CVE-2023-1032 CVE-2023-1281 CVE-2023-22997 CVE-2023-26545 CVE-2023-26606 CVE-2023-28328 CVE-2023-3357
Systems running Ubuntu 22.10 Kinetic can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-6024-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 22.10
Kinetic install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Note: Oracle will not provide a zero-downtime update for CVE-2022-3534, CVE-2022-3606.
The kernel is not affected by CVE-2022-3534, CVE-2022-3606 since the code
under consideration is not compiled.
* CVE-2023-0615: Out-of-bounds memory access in the Virtual Video Test Driver.
Lack of boundary checks when adjusting the composing height could lead to
an out-of-bounds memory access. A local user with the ability to send
IOCTL to the V4L2 VIVID driver could use this flaw to cause a
denial-of-service or elevate privileges.
* CVE-2023-28328: Denial-of-service in Azurewave AZ6027 driver during ioctl processing.
A missing length check on a buffer passed in from userspace via an ioctl
can result in a NULL pointer dereference. This flaw could be exploited
by a remote attacker to cause a denial-of-service.
* CVE-2023-26606: Information disclosure in NTFS3.
An bad loop termination condition in NTFS3's ntfs_trim_fs may lead to an
out-of-bounds memory read. A local attacker could use this flaw to cause
a denial-of-service or expose sensitive information.
* CVE-2019-19082: Memory leak when creating memory pool in AMD Display driver.
A missing free of resources when creating memory pools in AMD Display
driver could lead to a memory leak. A local attacker could use this flaw
to exhaust kernel memory and cause a denial-of-service.
* CVE-2022-47929: NULL dereference in traffic control subsystem.
Specially crafted network traffic can cause a NULL pointer dereference
in the network traffic control subsystem. This flaw could be exploited
by a malicious local user to cause a denial-of-service.
* CVE-2023-1281: Use-after-free in Packet Classifier based on Traffic Control Indices.
The imperfect hash area in the traffic control index filter can be
updated while packets are traversing which can lead to a use-after-free.
A local attacker can use this to escalate privileges.
* CVE-2022-41218: Use-after-free in dvb-core device release path.
Improper locking during device release operations can lead to a
use-after-free error in the dvb-core driver. This bug could be
exploited by a malicious local attack to cause a denial-of-service or to
escalate privileges.
* CVE-2023-26545: Stale pointer in MultiProtocol Label Switching subsystem.
Incorrect error handling in the MultiProtocol Label Switching subsystem
(MPLS) during the renaming of a device can lead to double free. This could
allow a local user to write to arbitrary memory locations or cause
denial-of-service.
* CVE-2022-3424: Denial-of-service in SGI GRU driver.
A logic error when using SGI GRU driver could lead to a use-after-free.
A local attacker could use this flaw to cause a denial-of-service.
* CVE-2023-1032: Denial-of-service in io_uring subsystem.
A memory allocation failure when a socket is allocated by the io_uring
subsystem could lead to a double free. A local attacker could use this
flaw to cause a denial-of-service.
* Note: Oracle will not provide an update for CVE-2023-22997.
CVE-2023-22997 is a denial-of-service when decompressing kernel module.
The compression of kernel module is not enabled in kinetic.
* CVE-2022-2873: Out-of-bounds memory access in iSMT.
A missing sanity check for a user controlled value in the Intel's iSMT
SMBus host controller driver when processing an SMBus command may lead
to a memory corruption by writing past the end of a buffer. A local
user could use this flaw for denial-of-service or code execution.
* CVE-2023-3357: Denial-of-service when using AMD Sensor Fusion Hub driver.
A missing check when using AMD Sensor Fusion Hub driver could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-22.10-updates
mailing list