[Ksplice-Fedora-29-updates] New Ksplice updates for Fedora 29 (FEDORA-2019-b0f7a7b74b)

Oracle Ksplice ksplice-support_ww at oracle.com
Wed Feb 6 20:54:52 PST 2019


Synopsis: FEDORA-2019-b0f7a7b74b can now be patched using Ksplice
CVEs: CVE-2019-3701

Systems running Fedora 29 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2019-b0f7a7b74b.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 29
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Use-after-free in AX.25 radio device driver.

Logic errors in the AX.25 amateur radio device driver can result in
use-after-free in several error paths, potentially resulting in a
denial-of-service.


* NULL-pointer dereference when removing vxlan interface with GRO enabled.

When receiving data with Generic Receive Offload enabled on a vxlan
tunnel interface, a race condition can result in a NULL-pointer
dereference and denial-of-service.


* NULL-pointer dereference when transmitting IEEE 802.15.4 packets.

When transmitting packets over an IEEE 802.15.4 device, a missing daddr
field might result in a NULL-pointer dereference and denial-of-service.


* Improved fix for Spectre v1: Bounds-check bypass in multicast ioctls.

The ioctl handlers for the ip6mr and ipmr multicast routing systems are
potentially vulnerable to Spectre variant 1 speculative execution
attacks.


* Race conditions in IPv6 tunnel code cause memory corruption.

Several rare race conditions in the IPv6 tunnel code could lead to
use-after-free of memory, potentially resulting in memory corruption or
a denial-of-service.


* Information leak in CAPI ISDN ioctl.

When reading device information via sysctl for a CAPI ISDN device, the
device manufacturer field might potentially contain unsanitized kernel
data, potentially leaking information to a malicious user.


* Race condition in 6pack radio device driver causes denial-of-service.

Incorrect usage of the kernel timer APIs in the 6pack radio device
driver could result in a kernel assertion failure and denial-of-service.


* Potential deadlock or DoS in TLS context allocation.

When allocating a Transport Layer Security context, memory allocation is
performed with incorrect CPU context flags, potentially resulting in a
system deadlock or kernel BUG.


* Missing validation of packet socket fields causes denial-of-service.

Missing validation of raw PF_PACKET socket parameters could allow
invalid socket structures to be created, resulting in memory corruption
or a denial-of-service.


* Information leak via IPv6 getsockopt syscall.

When requesting information about an IPv6 socket via the getsockopt
syscall, the sin6_flowinfo field is not properly cleared, potentially
exposing sensitive kernel information to a malicious user.


* Logic errors in TIPC protocol implementation cause memory corruption.

Missing synchronization and incorrect error handling in the Transport
Inter Process Communication protocol can result in memory corruption,
potentially causing a denial-of-service.


* NULL-pointer dereference in IPv6 routing in degenerate cases.

In cases where the IPv6 neighbor table is full or near-to-full,
attempting to compute routes could, in rare cases, dereference a NULL
pointer, resulting in a denial-of-service.


* NULL-pointer dereference when writing to HFI device in PIO mode.

When writing to a file across an HFI virtual network interface in PIO
mode, invalid socket configuration could result in a NULL-pointer
dereference and denial-of-service.


* Improved fix for Spectre v1: Bounds-check bypass in ALSA sound drivers.

Several ALSA sound device drivers contain array accesses whose values
are controlled by userspace input, and might therefore be vulnerable to
a Spectre variant 1 speculative bounds-check bypass attack.


* Use-after-free when truncating on F2FS object.

When truncating a node on a Flash-Friendly File System, a race condition
result in the use-after-free of a page structure, resulting in potential
memory corruption or a denial-of-service.


* Information leak in F2FS via extended attribute entry_size.

When reading extended attributes on a Flash-Friendly File System, a
specially crafted attribute request could potentially expose kernel
memory to userspace.


* NULL-pointer dereference when connecting CEC-capable capture device.

When connecting a remote controller that supports the Consumer
Electronics Control protocol, incorrect logic could cause a NULL-pointer
dereference and denial-of-service.


* CVE-2019-3701: Denial-of-service in CAN controller.

Missing sanity checking in the Controller Area Network driver can allow
a malicious user to write arbitrary bits into the CAN device's I/O
memory, resulting in a system crash and denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-29-Updates mailing list