Oracle Linux 6167 Published by

New Ksplice updates for UEKR6 5.4.17 on Oracle Linux 7 and 8 are available.



New Ksplice updates for UEKR6 5.4.17 on OL7 and OL8 (ELSA-2023-12874)


Synopsis: ELSA-2023-12874 can now be patched using Ksplice
CVEs: CVE-2022-0185 CVE-2023-1206 CVE-2023-1611 CVE-2023-20569 CVE-2023-20588 CVE-2023-34319 CVE-2023-3611 CVE-2023-3772 CVE-2023-39194 CVE-2023-40283 CVE-2023-4128 CVE-2023-4194 CVE-2023-4911 CVE-2023-5090

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-12874.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2023-12874.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR6 5.4.17 on
OL7 and OL8 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2023-5090: Privilege escalation from KVM guests when configuring the x2apic.

A logic error in the KVM MSR interception routine allows a KVM guest to
configure the host x2apic. A local, unprivileged guest VM could use this
flaw to escalate privileges to that of the host hypervisor.

* Improved Known exploit detection for CVE-2022-0185.

* CVE-2023-5090: Privilege escalation from KVM guests when configuring the x2apic.

A logic error in the KVM MSR interception routine allows a KVM guest to
configure the host x2apic. A local, unprivileged guest VM could use this
flaw to escalate privileges to that of the host hypervisor.

* CVE-2023-3611: Privilege escalation in QFQ network scheduler.

An arithmetic error in the Quick Fair Queueing network scheduler can
lead to an out-of-bounds write. This flaw can be exploited by a local
attacker to escalate their privilege.

* CVE-2023-4128: Use-after-free when modifying Netfilter U32/route filters.

A logic error when copying an internal memory structure can lead to a
use-after-free when modifying certain Netfilter filters. A local
attacker could exploit this flaw to escalate their privileges.

* CVE-2023-40283: Use-after-free during Bluetooth socket teardown.

An incomplete cleanup operation when tearing down Bluetooth L2CAP
sockets can lead to a use-after-free. This flaw could potentially be
exploited to cause a denial-of-service or other unexpected behavior.

* CVE-2023-3772: Denial-of-service in the IP framework for transforming packets.

A missing check in the IP framework for transforming packets could lead
to a NULL pointer dereference. A local attacker could use this flaw to
cause a denial-of-service.

* Performance improvement when using shared memory virtual filesystem.

Improve performance with allocation of shared memory huge pages.

Orabug: 35655117

* CVE-2023-4194: Permission bypass when using TUN/TAP device driver.

Usage of an incorrect permission attribute when opening a TAP or TUN
device could lead to a permission bypass. A local attacker could use
this flaw to bypass network filters and gain unauthorized access.

* Add possibility to disable usage of io_uring subsystem.

io_uring subsystem has many security issues with some of it being
impossible to live patch. Thus, Oracle decided to add a way for customer
not using io_uring to disable it for unprivileged user by using
/proc/sys/kernel/io_uring_disabled knob.

Note that io_uring is disabled by default for unprivileged users.

Orabug: 35819375

* CVE-2023-34319, XSA-432: Buffer overflow in Xen netback driver.

Incorrect logic in the Xen netback driver while handling packets can lead to a
buffer overflow. An unprivileged guest can cause denial-of-service of the host
network.

* CVE-2023-1611: Use-after-free in the BTRFS filesystem.

A use-after-free is possible in the BTRFS file system when a quota assign ioctl
and quota disable ioctls run concurrently. A local user could use this flaw to
cause a denial-of-service or execute arbitrary code.

* CVE-2023-39194: Information disclosure when using xfrm subsystem.

A missing check when using xfrm subsystem could lead to an out-of-bounds
access. A local user could use this flaw to leak sensitive information.

* CVE-2023-20588: Information disclosure on AMD CPUs.

A hardware flaw on some AMD processors when handling division-by-zero
errors may result in speculative data exposure. An attacker could use this
flaw to access sensitive information.

Orabug: 35776936

* Note: Oracle will not provide a zero-downtime update for CVE-2023-1206.

Oracle has determined that patching CVE-2023-1206 on a running system
would not be safe and recommends a reboot.

* Note: Oracle will not provide a zero-downtime update for CVE-2023-20569.

Oracle has determined that patching CVE-2023-20569 on a running system
would not be safe and recommends a reboot.

Orabug: 35818857

* CVE-2023-4911: Buffer overflow in the GNU C Library's dynamic loader while processing environment variables.

Incorrect processing of environment variables in the GNU C Library's
dynamic loader ld.so can result in buffer overflow. This flaw could
allow a local attacker to elevate their privileges when launching
binaries with SUID permission.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.