[Ksplice-Fedora-28-updates] New Ksplice updates for Fedora 28 (FEDORA-2018-ab23a7ca88)

Oracle Ksplice ksplice-support_ww at oracle.com
Mon Jul 30 05:14:23 PDT 2018


Synopsis: FEDORA-2018-ab23a7ca88 can now be patched using Ksplice
CVEs: CVE-2018-10878

Systems running Fedora 28 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2018-ab23a7ca88.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 28
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* NULL pointer dereference when getting network statistics in Mellanox Technologies ConnectX-4 and Connect-IB driver.

A logic error when getting network statistics with Mellanox Technologies
ConnectX-4 and Connect-IB core driver could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a
denial-of-service.


* Use-after-free when receiving tpacket with virtio header over a TCP socket.

A logic error when receiving tpacket with virtio header over a TCP
socket could lead to a use-after-free. A local
attacker could use this flaw to cause a denial-of-service.


* Denial-of-service when using Inter-FE action based on IETF ForCES InterFE LFB.

A logic error when using Inter-FE action based on IETF ForCES InterFE
LFB could lead to a use-after-free and a deadlock. A local attacker
could use this flaw to cause a denial-of-service.


* NULL pointer dereference when setting backend in Host kernel accelerator for virtio net.

A missing check in error path when setting backend in Host kernel
accelerator for virtio net could lead to a NULL pointer dereference. A
local attacker could use this flaw to cause a denial-of-service.


* NULL pointer dereference when initializing Cadence network driver.

A missing variable initialization when initializing Cadence network
driver could lead to a NULL pointer dereference. A local attacker could
use this flaw to cause a denial-of-service.


* Improved fix for Spectre v1: Bounds-check bypass in Chelsio Communications T3 10Gb Ethernet driver.

A missing sanitization of array index after bounds check in Chelsio
Communications T3 10Gb Ethernet driver could lead to an information
leak. A local attacker could use this flaw to leak information about
running system.


* Denial-of-service when connecting to an access point with Realtek rtlwifi family of devices.

A race condition when connecting to an access point and quickly entering
and leaving power states with Realtek rtlwifi family of devices could
lead to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.


* Use-after-free in ebtables evaluation loop.

A missing check in ebtables evaluation loop could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* Buffer overflow in warning messages of Reiser filesystem.

A missing bounds check when printing mount options in warning messages
of Reiser filesystem could lead to a buffer overflow. A local attacker
could use crafted mount options to cause a denial-of-service.


* Use-after-free when sending messages over Transport Layer Security socket.

A logic error when sending messages over Transport Layer Security socket
could lead to a use-after-free. A local attacker could use this flaw to
cause a denial-of-service.


* Out-of-bounds access when using Kernel automounter version 4.

A missing check on user input when using Kernel automounter version 4
could lead to an out-of-bounds access. A local attacker could use this
flaw to cause a denial-of-service.


* Memory leak when closing a bpf socket.

A logic error when closing a bpf socket could lead to a memory leak. A
local attacker could use this flaw to exhaust kernel memory and cause a
denial-of-service.


* Improved fix for CVE-2018-10878: Out-of-bounds access when initializing ext4 block bitmap.

A logic error in the previous fix for CVE-2018-10878 prevented mounting ext4
filesystems with metablock groups enabled.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-28-Updates mailing list