[Ksplice][Ubuntu-Oracle-Updates] New Ksplice updates for Ubuntu OCI kernel (USN-4749-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Mar 4 06:50:14 PST 2021


Synopsis: USN-4749-1 can now be patched using Ksplice
CVEs: CVE-2020-25669 CVE-2020-27815 CVE-2020-27830 CVE-2020-28941 CVE-2020-29372 CVE-2020-29374 CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661

Systems running Ubuntu OCI kernel can now use Ksplice to patch against
the latest Ubuntu Security Notice, USN-4749-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu OCI
kernel install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2020-29569: Use-after-free when disconnecting Xen block devices.

A logic error when disconnecting Xen block devices may cause a use-after-free.
A rouge guest instance may be able to use this to cause a Denial-of-Service
on dom0.


* CVE-2020-29661: Use-after-free in ioctls of TTY subsystem.

A locking flaw in ioctls of TTY subsystem could lead to a use-after-free.
A local user could use this flaw to cause execution of arbitrary code or
a denial-of-service.


* CVE-2020-28941: Denial-of-service in Speakup Screen Reader.

A invalid memory release in Speakup Screen Reader driver when using
the tty line discipline multiple times could lead to the system crash.
A local user could use this flaw for a denial-of-service.


* CVE-2020-29372: Denial-of-service in Memory Management subsystem due to a race condition.

A race condition in Memory Management subsystem could result in loss
of availability. A local user could use this flaw to cause
a denial-of-service.


* CVE-2020-29660: Use-after-free in TTY subsystem due to locking inconsistency.

A locking inconsistency in TTY subsystem could lead to a use-after-free.
A local user could use this flaw to cause execution of arbitrary code or
a denial-of-service.


* CVE-2020-29374: Multiple vulnerabilities in get_user_pages of Memory Management subsystem.

Due to a flaw in Memory Management subsystem unintended write access
could be granted when get_user_pages is used for a copy-on-write page.
A local user could use this flaw to cause a wide range of problems,
including information exposures, denial of service, and arbitrary code
execution.


* CVE-2020-25669: Use-after-free in Sun Type 4 and Type 5 keyboard driver.

A logic error in Sun Type 4 and Type 5 keyboard driver could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of- service.


* CVE-2020-27830: NULL-pointer dereference in Speakup line discipline.

THe driver for the Speakup Screen Reader exposes a line discipline to
userspace. A bug in the driver fails to account for a NULL
spk_ttyio_synth pointer, resulting in a potential denial-of-service if a
malicious user accesses the discipline.


* Oracle has determined that CVE-2020-27815 is not applicable.

Oracle has determined that CVE-2020-27815 is not applicable and corrects a
false-positive linter warning.  Applying the patch has no resulting
changes in the generated object files.


* Note: Oracle will not be providing a rebootless update for CVE-2020-29568.

Oracle has determined that patching this vulnerability live on a running system
would not be safe and is recommending to reboot the vulnerable hosts.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-Oracle-Updates mailing list