El-errata: New Ksplice updates for RHEL 8 (ELSA-2023-0832)
Synopsis: ELSA-2023-0832 can now be patched using Ksplice
CVEs: CVE-2022-2873 CVE-2022-41222 CVE-2022-43945
Systems running Red Hat Enterprise Linux 8 can now use Ksplice to
patch against the latest Red Hat kernel update, ELSA-2023-0832.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-0832.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHEL 8 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2022-43945: Out-of-bounds memory access in NFSD.
A logic error in NFSD when a small RPC Call message arrives in an
oversized RPC record can lead to a buffer overflow. A remote attacker
could use this flaw for a denial-of-service or privilege escalation.
* CVE-2022-2873: Out-of-bounds memory access in iSMT.
A missing sanity check for a user controlled value in the Intel's iSMT
SMBus host controller driver when processing an SMBus command may lead
to a memory corruption by writing past the end of a buffer. A local
user could use this flaw for denial-of-service or code execution.
* CVE-2022-41222: Use-after-free in MMU-based Paged Memory Management
Support.
A race condition flaw in MMU-based Paged Memory Management Support due
to improper locking could result in use-after-free when moving page
tables. A local user could use this flaw for denial-of-service or code
execution.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.
_______________________________________________
New Ksplice updates for RHEL 8 are available.