[Ksplice-Fedora-25-updates] New Ksplice updates for Fedora 25 (FEDORA-2017-65f852596f)

Oracle Ksplice ksplice-support_ww at oracle.com
Sun Jul 2 23:41:19 PDT 2017


Synopsis: FEDORA-2017-65f852596f can now be patched using Ksplice

Systems running Fedora 25 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2017-65f852596f.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 25
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service when using Geschwister Schneider UG interfaces.

A missing free when closing USB Geschwister Schneider net device could
lead to a memory leak. A local attacker could use this flaw to exhaust
kernel memory and cause a denial-of-service.


* Denial-of-service when using videobuf2 core framework.

A check error when using videobuf2 core framework could lead to an out
of bound access. A local attacker could use this flaw to cause a
denial-of-service.


* Denial-of-service when using context mount options.

A missing check in error path when mounting filesystem with specific
context mount options while SELinux is enabled could lead to a double
free. A local attacker could use this flaw to cause a denial-of-service.


* Denial-of-service when using independent BSS feature of mac80211.

An error in allocation size when using IBSS could lead to an out of
bound access. A local attacker could use this flaw to cause a
denial-of-service.


* Denial-of-service when closing USB gadget FS file.

A logic error when releasing a USB Gadget filesystem file could lead to
a general protection fault or an use-after-free. A local attacker could
use this flaw to cause a denial-of-service.


* Denial-of-service when setting alarm timer.

An overflow when setting alarm timer leads to alarm expiring immediately
in a loop, causing a high cpu load. A local attacker could use this flaw
to cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-25-Updates mailing list