[Ksplice][Ubuntu-Oracle-Updates] New Ksplice updates for Ubuntu OCI kernel (USN-5984-1)
Oracle Ksplice
quentin.casasnovas at oracle.com
Tue Apr 18 03:46:35 UTC 2023
Synopsis: USN-5984-1 can now be patched using Ksplice
CVEs: CVE-2021-3669 CVE-2022-2873 CVE-2022-36280 CVE-2022-41218 CVE-2022-47929 CVE-2023-0045 CVE-2023-0266 CVE-2023-0394 CVE-2023-0615 CVE-2023-23455 CVE-2023-23559 CVE-2023-28328
Systems running Ubuntu OCI kernel can now use Ksplice to patch against
the latest Ubuntu Security Notice, USN-5984-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu OCI
kernel install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2023-0045: Deficiency in existing speculative attack mitigation.
A missing branch predictor barrier leaves systems vulnerable to certain
speculative attacks. This flaw could be exploited to leak information
from a running system.
* CVE-2023-23559: Buffer overflow in driver for RNDIS-based wireless USB devices.
A buffer overflow exists in the driver code for wireless USB devices based on
Remote Network Driver Interface Specification (RNDIS). This could allow a local
user to cause denial-of-service.
* CVE-2023-0615: Out-of-bounds memory access in the Virtual Video Test Driver.
Lack of boundary checks when adjusting the composing height could lead to
an out-of-bounds memory access. A local user with the ability to send
IOCTL to the V4L2 VIVID driver could use this flaw to cause a
denial-of-service or elevate privileges.
* CVE-2023-28328: Denial-of-service in Azurewave AZ6027 driver during ioctl processing.
A missing length check on a buffer passed in from userspace via an ioctl
can result in a NULL pointer dereference. This flaw could be exploited
by a remote attacker to cause a denial-of-service.
* CVE-2022-2873: Out-of-bounds memory access in iSMT.
A missing sanity check for a user controlled value in the Intel's iSMT
SMBus host controller driver when processing an SMBus command may lead
to a memory corruption by writing past the end of a buffer. A local
user could use this flaw for denial-of-service or code execution.
* CVE-2022-41218: Use-after-free in dvb-core device release path.
Improper locking during device release operations can lead to a
use-after-free error in the dvb-core driver. This bug could be
exploited by a malicious local attack to cause a denial-of-service or to
escalate privileges.
* CVE-2022-36280: Out-of-bounds access in vmwgfs driver during cursor snoop.
A failure to validate cursor size data during a snoop operation can
lead to an out-of-bounds memory access. A malicious local user could
exploit this flaw to escalate their privileges, or to cause a
denial-of-service.
* CVE-2023-23455: Denial-of-service in ATM Virtual Circuit queue operation.
A logic error during a queue operation in the sch_atm driver can result
in an invalid pointer access. This flaw could be exploited by a local
attacker to cause a denial-of-service.
* CVE-2022-47929: NULL dereference in traffic control subsystem.
Specially crafted network traffic can cause a NULL pointer dereference
in the network traffic control subsystem. This flaw could be exploited
by a malicious local user to cause a denial-of-service.
* CVE-2023-0266: Use-after-free in ALSA PCM IOCTL processing.
Missing locks around certain operations can lead to a use-after-free
in the ALSA PCM driver. This flaw could by exploited by a local
attacker to escalate their privileges.
* CVE-2023-0394: NULL dereference during IPv6 raw frame processing.
An arithmetic error when processing certain IPv6 header information can
lead to a NULL pointer dereference. A malicious local user could
exploit this flaw to cause a denial-of-service.
* CVE-2021-3669: Denial-of-service when measuring shared memory usage.
A flaw when attempting to measure large amounts of shared memory can
lead to memory exhaustion. An attacker could exploit this flaw to waste
system resources and potentially cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-Oracle-Updates
mailing list