[Ksplice][EL8-Updates] New Ksplice updates for OL 8 and RHEL 8 (RHSA-2019:1959)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Aug 1 09:17:01 PDT 2019
Synopsis: RHSA-2019:1959 can now be patched using Ksplice
CVEs: CVE-2018-20784 CVE-2019-11085 CVE-2019-11810 CVE-2019-11811
Systems running RHCK on Oracle Linux 8 and Red Hat Enterprise Linux 8
can now use Ksplice to patch against the latest Red Hat Security
Advisory, RHSA-2019:1959.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running OL 8 and RHEL 8
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2019-11085: Privilege escalation in Intel i915 pass-through devices.
Incorrect address validation for an Intel i915 device passed through to
a virtual machine could result in an out-of-bounds memory access. A
privileged user in the VM could use this flaw to crash the host or
potentially leak the memory contents of the host or other VMs on the
system.
* CVE-2019-11810: Denial-of-service in LSI Logic MegaRAID probing.
A logic error in the LSI Logic MegaRAID device probing could result in a
NULL pointer dereference and kernel crash under specific conditions.
* CVE-2019-11811: Privilege escalation in IPMI module unload.
Incorrect error handling could result in an invalid pointer dereference
on reads of /proc/ioports after unloading the IPMI driver. A local user
could use this flaw to crash the system, disclose sensitive memory
contents or potentially escalate privileges.
* CVE-2018-20784: Denial-of-service in task scheduling.
A logic in the kernel task scheduler could result in an infinite loop
under high load conditions. A local, unprivileged user could use this
flaw to cause a denial of service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-EL8-updates
mailing list