Oracle Linux 6135 Published by

New Ksplice updates for UEKR7 5.15.0 on Oracle Linux 8 and 9 are available.



El-errata: New Ksplice updates for UEKR7 5.15.0 on OL8 and OL9 (ELSA-2023-12017)


Synopsis: ELSA-2023-12017 can now be patched using Ksplice CVEs:
CVE-2022-3524 CVE-2022-3543 CVE-2022-3564 CVE-2022-3619 CVE-2022-3623
CVE-2022-3628 CVE-2022-3640 CVE-2022-42895 CVE-2022-42896

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2023-12017.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2023-12017.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on
OL8 and OL9 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2022-3564: Use-after-free in Bluetooth L2CAP.

A race condition in Bluetooth L2CAP when a socket buffer is queued and
dequeued by two flows running in parallel can lead to a use-after-free.
A remote attacker could use this flaw for a denial-of-service or
for privilege escalation.

* CVE-2022-3524: Memory-leak in IPv6 networking.

A race condition in IPv6 networking when converting an IPv6 socket into
IPv4 could lead to a memory-leak. A local user could use this flaw to
exhaust the system's memory and cause denial-of-service.

* CVE-2022-42896: Use-after-free in Bluetooth L2CAP.

A flaw in Bluetooth L2CAP protocol when accepting incoming connection
requests could lead to a use-after-free. A remote attacker could use
this flaw for a denial-of-service or for privilege escalation.

* CVE-2022-42895: Information disclosure in Bluetooth subsystem.

A missing sanity check when parsing a configuration request in Bluetooth
L2CAP implementation could result in out-of-bounds memory access.
A physically proximate attacker could use this flaw for information
disclosure.

* CVE-2022-3640: Use-after-free in Bluetooth subsystem.

A logic flaw in receive data path of the Bluetooth subsystem could
result in a use-after-free. A local user could use this flaw to cause
a denial-of-service or execute arbitrary code.

* CVE-2022-3628: Code execution in Broadcom FullMAC USB WiFi driver.

A missing sanity check when setting up the Broadcom FullMAC USB WiFi
driver could result in out-of-bounds access. A physically proximate
user could use this flaw to craft a malicious USB device and cause
a denial-of-service or execute arbitrary code.

* CVE-2022-3623: Information disclosure in hugetlb.

A race condition in hugetlb when multiple threads are looking up
CONT-PTE/PMD pages could lead to page table inconsistencies. A local
attacker could use this to cause a denial-of-service or expose sensitive
information.

* CVE-2022-3543: Denial-of-service in Unix domain sockets.

Improperly released resources in the AF_UNIX sockets when closing
sockets with unconsumed out-of-band buffers could lead to a memory leak.
A local user could use this flaw to exhaust kernel memory and cause de
denial-of-service.

* CVE-2022-3619: Denial-of-Service in Bluetooth L2CAP.

Improperly released resources in Bluetooth L2CAP when handling
fragmented frames could result in a memory leak. A remote user could
use this flaw to exhaust the kernel memory and cause a
denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.


_______________________________________________