[Ksplice-Fedora-24-updates] New Ksplice updates for Fedora 24 (FEDORA-2017-4b9f61c68d)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Mar 2 11:50:13 PST 2017


Synopsis: FEDORA-2017-4b9f61c68d can now be patched using Ksplice
CVEs: CVE-2017-6074 CVE-2017-6214

Systems running Fedora 24 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2017-4b9f61c68d.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 24
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Invalid memory access in IPv6 tunneling subsystem.

A missing check on socket buffer and use of a stale pointer results in
invalid memory accesses inside the IPv6 tunneling subsystem. This may
lead to undefined behavior in the kernel or denial-of-service.


* Use-after-free when processing IPv6 SYN packets.

Incorrect memory management when processing IPv6 SYN packets with IP
options can trigger a use-after-free condition and kernel panic. An
attacker can exploit this to execute arbitrary code in kernel mode.


* CVE-2017-6214: Denial-of-service when splicing from TCP socket.

A specially crafted packet can be queued to trigger an infinite loop in
IPv4 subsystem. This can be exploited by an remote attacker to cause
denial-of-service.


* Denial-of-service in IPv4 `ping' implementation.

A missing null-pointer check in the ping implementation inside the IPv4
subsystem allows a unprivileged local user to crash the kernel and cause
denial-of-service.


* Denial-of-service in CIPSO / IPv4 protocol engine.

Missing length check in CIPSO protocol implementation results in
out-of-bound memory access. An unprivileged local process can exploit
this to read kernel memory or cause denial-of-service.


* CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option.

A logic error when using IPV6_RECVPKTINFO socket option could lead to a
use-after-free. A local user could use this flaw to cause a
denial-of-service.


* Denial-of-service in IPv6-over-IPv4 tunnel subsystem.

Failure to reset a flag when initializing an IPv6 over IPv4 tunnel fails
results in a double-free causing denial-of-service.


* Denial-of-service when reading and writing from FUSE device.

A race-condition between concurrent read and write operations on a FUSE
device can crash the kernel, leading to denial-of-service.


* Denial-of-service in SCSI Generic driver.

A missing sanity-check when writing to generic SCSI device may lead to
kernel panic. An unprivileged user with write permission to /dev/sg can
exploit this to cause denial-of-service.


* Denial-of-service in Direct Rendering Manager (DRM) subsystem.

An inconsistent control flow when using multiple displays through Direct
Rendering Manager Display Port interface can cause kernel panic, leading
to denial-of-service.


* Denial-of-service when IP encapsulation for L2TP is used.

A bug in SIOCINQ ioctl handler results in kernel crash when plain IP
encapsulation for L2TP frames are used. A userspace process capable of
creating L2TP tunnels can exploit this to cause denial-of-service.


* Denial-of-service when reading USB RTL8150 registers.

An incorrect usage of DMA buffer on the stack could lead to a stack
corruption since CONFIG_VMAP_STACK is enabled. A local attacker could
use this flaw to cause a denial-of-service.


* Buffer overflow when parsing Link layer headers through TCP socket.

An incorrect length computation when sending packet over TCP socket with
specific header length could lead to a buffer overflow. A local attacker
could use this flaw to cause a denial-of-service.


* Data race in virtio network device drivers.

Unprotected reads from shared data structures in macvtap and tun device
drivers allows data race, potentially leading to kernel memory
corruption and denial-of-service.


* Denial-of-service when doing DMA transfer on Pegasus USB device.

An incorrect usage of DMA buffer on the stack could lead to a stack
corruption since CONFIG_VMAP_STACK is enabled. A local attacker could
use this flaw to cause a denial-of-service.


* Denial-of-service when TCP window scaling is not enabled.

A division-by-zero error occurs when selecting the window size for TCP
over IPv4, resulting in denial-of-service.


* Memory leak when using IGMP in combination with multi casting.

A missing free when using IGMP with multi casting could lead to a memory
leak. A local attacker could use this flaw to exhaust kernel memory and
cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-24-Updates mailing list