Oracle Linux 6134 Published by

New Ksplice updates for RHEL 8 are available.



El-errata: New Ksplice updates for RHEL 8 (ELSA-2023-0832)


Synopsis: ELSA-2023-0832 can now be patched using Ksplice
CVEs: CVE-2022-2873 CVE-2022-41222 CVE-2022-43945

Systems running Red Hat Enterprise Linux 8 can now use Ksplice to
patch against the latest Red Hat kernel update, ELSA-2023-0832.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2023-0832.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHEL 8 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2022-43945: Out-of-bounds memory access in NFSD.

A logic error in NFSD when a small RPC Call message arrives in an
oversized RPC record can lead to a buffer overflow. A remote attacker
could use this flaw for a denial-of-service or privilege escalation.

* CVE-2022-2873: Out-of-bounds memory access in iSMT.

A missing sanity check for a user controlled value in the Intel's iSMT
SMBus host controller driver when processing an SMBus command may lead
to a memory corruption by writing past the end of a buffer. A local
user could use this flaw for denial-of-service or code execution.

* CVE-2022-41222: Use-after-free in MMU-based Paged Memory Management
Support.

A race condition flaw in MMU-based Paged Memory Management Support due
to improper locking could result in use-after-free when moving page
tables. A local user could use this flaw for denial-of-service or code
execution.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.



_______________________________________________