[Ksplice-Fedora-28-updates] New Ksplice updates for Fedora 28 ( FEDORA-2018-18c53c4a64 )

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Dec 21 12:58:26 PST 2018


Synopsis:  FEDORA-2018-18c53c4a64  can now be patched using Ksplice

Systems running Fedora 28 can now use Ksplice to patch against the
latest Fedora kernel update,  FEDORA-2018-18c53c4a64 .

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 28
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* NULL-pointer dereference when removing xHCI device hub.

When removing an xHCI USB device hub, a race condition exists where
NULL pointers might be improperly dereferenced, resulting in an
exception and potential denial-of-service.


* Memory corruption when failing readdir on 9Pfs.

When failing a readdir on the Plan 9 Filesystem Protocol, the stat
structure might be improperly freed twice, resulting in memory
corruption or a potential denial-of-service.


* Use-after-free when disconnecting sctp connection with outstanding data.

If an sctp connection is shut down with data still remaining to be sent,
in rare cases the structures holding this data can be accessed after
they are freed, resulting in potential memory corruption or a
denial-of-service.


* Use-after-free in link-layer with non-TCP/DCCP traffic.

When receiving data from a non-TCP or DCCP protocol, a race condition
might occur between processing data received on the link and freeing it.
This results in a use-after-free, and potential memory corruption or
denial-of-service.


* Denial-of-service when unmounting NFSv4 filesystem with delegations.

When unmounting an NFSv4 filesystem with outstanding delegations, a race
condition might occur where the server recalls those delegations during
shutdown, resulting in a kernel assertion failure and denial-of-service.


* Potential information leak via lingering terminal buffer.

In several cases, data in terminal buffers is not cleared after use.
This data would be a valuable target for malicious users.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-28-Updates mailing list