El-errata: New Ksplice updates for RHCK 9 (ELSA-2023-0951)
Synopsis: ELSA-2023-0951 can now be patched using Ksplice
CVEs: CVE-2022-2873 CVE-2022-3564 CVE-2022-4378 CVE-2022-4379 CVE-2023-0179
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-0951.
More information about this errata can be found at
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHCK 9 install
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2022-4378: Out-of-bounds memory access in sysctl.
A flaw parsing character strings in the sysctl subsystem when changing
kernel parameters can lead to a stack overflow. A local user could use
this flaw for a denial-of-service or arbitrary code execution.
* CVE-2022-3564: Use-after-free in Bluetooth L2CAP.
A race condition in Bluetooth L2CAP when a socket buffer is queued and
dequeued by two flows running in parallel can lead to a use-after-free.
A remote attacker could use this flaw for a denial-of-service or
for privilege escalation.
* CVE-2023-0179: Denial-of-service when handling VLAN headers.
A logic error in the handling of VLAN headers in netfilter could lead to
an out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service or execute arbitrary code.
* CVE-2022-2873: Out-of-bounds memory access in iSMT.
A missing sanity check for a user controlled value in the Intel's iSMT
SMBus host controller driver when processing an SMBus command may lead
to a memory corruption by writing past the end of a buffer. A local
user could use this flaw for denial-of-service or code execution.
* CVE-2022-4379: Denial-of-service in NFS version 4 client.
A use-after-free flaw in NFS4 when when handling a server-to-server copy
may cause an invalid pointer dereference. A remote attacker could use this
flaw for a denial-of-service.
Ksplice support is available at email@example.com.
New Ksplice updates for RHCK 9 has been released.