Synopsis: ELSA-2023-13043 can now be patched using Ksplice CVEs: CVE-2021-26708 CVE-2022-2602 CVE-2023-31085 CVE-2023-34324 CVE-2023-37453 CVE-2023-4244 CVE-2023-42752 CVE-2023-42754 CVE-2023-42756 CVE-2023-45871 CVE-2023-4623 CVE-2023-4921 CVE-2023-5090 CVE-2023-5158 CVE-2023-5178 CVE-2023-5197 CVE-2023-6176
Users with Oracle Linux Premier Support can now use Ksplice to patch against the latest Oracle Linux Security Advisory, ELSA-2023-13043. More information about this errata can be found at https://linux.oracle.com/errata/ELSA-2023-13043.html INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running UEKR7 5.15.0 on OL8 and OL9 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * Deadlock when iterating ISCSI devices. A logic error when iterating ISCSI devices could lead to a deadlock. A local attacker could use this flaw to cause a denial-of-service. Orabug: 35886688 * CVE-2023-4623: Use-after-free in in the Traffic Control subsystem. A flaw in net/sched: sch_hfsc component may lead to a use-after-free. A local user could use this flaw for privilege escalation. * CVE-2023-42752: Out-of-bounds memory access in TCP/IP networking. Insufficient checks for integer overflow when allocating a socket buffer could lead to an out-of-bounds memory write. A local user could use this flaw for arbitrary code execution. * CVE-2023-45871: Denial-of-service in Intel(R) 82575/82576 PCI-Express Gigabit Ethernet driver. An error when allocating memory to handle received frames in Intel(R) 82575/82576 PCI-Express Gigabit Ethernet driver could lead to a buffer overflow. A remote attacker could use this flaw to cause a denial-of- service. * CVE-2023-4921: Use-after-free in QFQ packet scheduler. The Quick Fair Queueing packet scheduling algorithm did not properly handle network packets in some situations, leading to a use-after-free. A local user could use this flaw to cause a denial-of-service or potentially execute arbitrary code. * CVE-2023-6176: Privilege escalation in Transport Layer Security subsystem. Incorrect error handling in the Transport Layer Security subsystem while performing cryptographic operations in some situations could lead to a NULL pointer dereference. A local attacker could use this flaw to cause a denial-of-service or potentially escalate privileges. * CVE-2023-42754: Denial-of-service on IPV4 link failure. A missing check on IPV4 link failure could lead to a NULL pointer dereference. A local attacker could use this flaw to cause a denial-of- service. * CVE-2023-42756: Denial-of-service in the netfilter subsystem. A race condition in netfilter between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic. A local user could use this flaw to cause a denial-of-service. * CVE-2023-31085: Denial-of-service in UBI driver. The UBI driver did not properly handle MTD devices with zero erasesize, which could trigger a divide-by-zero exception while attaching UBI devices. A local privileged attacker could use this flaw to cause a denial-of-service. * Use-after-free in Reliable Datagram Sockets driver. A reference count issue when a RDS MR reference a RDS socket could lead to a use-after-free. A local attacker could use this flaw to cause a denial-of-service or escalate privileges. Orabug: 35817900 * CVE-2023-37453: Denial-of-service in USB core. A race condition in the USB subsystem could lead to an out-of-bounds read while handling device descriptors in some situations. A local attacker could potentially use this flaw to cause a denial-of-service. * CVE-2023-5158: Denial-of-service in virtio ring. The host side virtio ring implementation did not properly handle iov buffers in some situations. A local attacker in a guest VM could use this flaw to crash the host system. * CVE-2023-5178: Privilege escalation in NVMe over Fabrics TCP. A logic error when using NVMe over Fabrics TCP could lead to a use-after-free. A remote attacker could use this flaw to escalate privileges. Orabug: 36028025 * CVE-2023-5197: Use-after-free in the netfilter subsystem. A flaw in nf_tables when adding and removing of rules from chain bindings within the same transaction may lead to a use-after-free. A local user could use this flaw for privilege escalation. * CVE-2023-5090: Privilege escalation from KVM guests when configuring the x2apic. A logic error in the KVM MSR interception routine allows a KVM guest to configure the host x2apic. A local, unprivileged guest VM could use this flaw to escalate privileges to that of the host hypervisor. Orabug: 35857365 * Note: Oracle will not provide a zero-downtime update for CVE-2023-4244. A race condition in the set implementation of nftables between the control plane and the garbage collection worker could lead to a use-after-free. A local user with CAP_NET_ADMIN access could use this flaw to cause a crash or expose sensitive kernel information. Oracle has determined that patching CVE-2023-4244 on a running system would not be safe and recommends a reboot. On workloads that permit it, a temporary mitigation is to disallow unprivileged users from creating namespaces: sudo sysctl -w kernel.unprivileged_userns_clone=0 * Note: Oracle will not provide a zero-downtime update for CVE-2023-34324. Oracle has determined that patching CVE-2023-34324 on a running system would not be safe and recommends a reboot. SUPPORT Ksplice support is available at [email protected]. _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata
