[Ksplice-Fedora-25-updates] New Ksplice updates for Fedora 25 (FEDORA-2017-e07d7fb18e)

Oracle Ksplice ksplice-support_ww at oracle.com
Mon Sep 25 01:24:43 PDT 2017


Synopsis: FEDORA-2017-e07d7fb18e can now be patched using Ksplice
CVEs: CVE-2017-1000251 CVE-2017-12153 CVE-2017-12154 CVE-2017-9984

Systems running Fedora 25 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2017-e07d7fb18e.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 25
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Double-free when registering a new driver on any bus.

A logic error in error path when adding a new driver to a bus could lead
to a double free. A local attacker could use this flaw to cause a
denial-of-service.


* Memory leak when using Atheros 802.11ac wireless cards.

A logic error when initializing Atheros 802.11ac wireless cards could
lead to a memory leak. A local attacker could use this flaw to cause a
denial-of-service.


* Denial-of-service when registering a new Realtek WiFi adapter.

A logic error in error path when registering a new Realtek WiFi adapter
over PCI could lead to a NULL pointer dereference. A local attacker
could use this flaw to cause a denial-of-service.


* Double-free when registering a Distributed Lock Manager filesystem.

A logic error in error path when registering a Distributed Lock Manager
filesystem could lead to a double-free. A local attacker could use this
flaw to cause a denial-of-service.


* Buffer overflow when getting scan result from Marvel WiFi-Ex adapter.

A logic error when getting scan results from Marvel WiFi-Ex adapter
could lead to a buffer overflow. A local attacker could use this flaw to
cause a denial-of-service.


* Memory leak when loading of firmware for Realtek WiFi adapters fail.

A missing free in error path when loading firmware for Realtek WiFi
adapters could lead to a memory leak. A local attacker could use this
flaw to cause a denial-of-service.


* Memory leak when mounting a swap file fails.

A logic error in error path when mounting an incorrect swap file could
lead to a memory leak. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2017-9984: Denial-of-service when reading DSP messages in Turtle Beach MultiSound drivers.

A logic error when receiving messages from DSP in Turtle Beach
MultiSound drivers could lead to out-of-bounds accesses. A local
attacker could use this flaw to cause a denial-of-service.


* Infinite loop when triggering a nested page fault from a KVM nested guest.

A logic error when handling a nested page fault from a KVM nested guest
could lead to an infinite loop. A local attacker could use this flaw to
cause a denial-of-service.


* CVE-2017-1000251: Stack overflow in Bluetooth L2CAP config buffer.

Incorrectly parsing a Bluetooth L2CAP configuration buffer could allow
it to overwrite data on the stack, potentially allowing a remote
attacker to execute arbitrary code in the kernel.


* Use-after-free when writing back to Network File System.

A logic error when writing back data to NFS could lead to multiple
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* Memory corruption when using NFS in data sync mode.

A logic error when writing in a file opened with O_DSYNC flag (data sync
mode) over NFS could lead to on-disk memory corruption.


* CVE-2017-12154: Denial-of-service when using KVM nested virtualization.

A missing flag when setting up a nested virtualization using KVM could
give access to CR8 register to L2 guest. A local attacker could use this
register to disable system external interrupts from L2 guest and cause a
denial-of-service.


* CVE-2017-12153: NULL pointer dereference in the Wireless configuration layer.

A failure to verify netlink attributes existence before processing them
could lead to a NULL pointer dereference.  A local user with CAP_NET_ADMIN
could use this flaw to cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-25-Updates mailing list