[Ksplice-Fedora-25-updates] New Ksplice updates for Fedora 25 (FEDORA-2017-65f852596f)
Oracle Ksplice
ksplice-support_ww at oracle.com
Sun Jul 2 23:41:19 PDT 2017
Synopsis: FEDORA-2017-65f852596f can now be patched using Ksplice
Systems running Fedora 25 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2017-65f852596f.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Fedora 25
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Denial-of-service when using Geschwister Schneider UG interfaces.
A missing free when closing USB Geschwister Schneider net device could
lead to a memory leak. A local attacker could use this flaw to exhaust
kernel memory and cause a denial-of-service.
* Denial-of-service when using videobuf2 core framework.
A check error when using videobuf2 core framework could lead to an out
of bound access. A local attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service when using context mount options.
A missing check in error path when mounting filesystem with specific
context mount options while SELinux is enabled could lead to a double
free. A local attacker could use this flaw to cause a denial-of-service.
* Denial-of-service when using independent BSS feature of mac80211.
An error in allocation size when using IBSS could lead to an out of
bound access. A local attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service when closing USB gadget FS file.
A logic error when releasing a USB Gadget filesystem file could lead to
a general protection fault or an use-after-free. A local attacker could
use this flaw to cause a denial-of-service.
* Denial-of-service when setting alarm timer.
An overflow when setting alarm timer leads to alarm expiring immediately
in a loop, causing a high cpu load. A local attacker could use this flaw
to cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-25-Updates
mailing list