[Ksplice-Fedora-29-updates] New Ksplice updates for Fedora 29 (FEDORA-2019-914542e05c)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Jun 20 03:33:11 PDT 2019
Synopsis: FEDORA-2019-914542e05c can now be patched using Ksplice
CVEs: CVE-2019-10126 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479
Systems running Fedora 29 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2019-914542e05c.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Fedora 29
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Data corruption when using a FAT filesystem.
A missing flush after a write operation on a FAT filesystem could lead
to data corruption or loss of data.
* Deadlock when using POSIX Message Queues on large memory SMP systems.
A logic error when using POSIX Message Queues on large memory SMP
systems could lead to a deadlock. A local attacker could use this flaw
to cause a denial-of-service.
* Undefined behavior in low memory case when using memory compaction.
A missing check in low memory case when using memory compaction could
lead to an undefined behavior.
* Denial-of-service when using F2FS filesystem with a crafted filesystem.
A logic error when using a specially crafted F2FS filesystem could lead
to multiple kernel asserts. A local attacker could use this flaw to cause a
denial-of-service.
* Reference leak in error path during F2FS filesystem recovery.
A wrong error path during F2FS filesystem recovery could lead to a
reference leak. A local attacker could use this flaw to exhaust kernel
memory and cause a denial-of-service.
* Deadlock in percpu memory allocator.
A locking error in the percpu memory allocator could lead to a deadlock.
A local attacker could use this flaw to cause a denial-of-service.
* Use-after-free when registering a configfs group.
A wrong error path when registering a configfs group could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Use-after-free when releasing a block multiqueue in the block layer.
A logic error when releasing a block multiqueue in the block layer could
lead to a use-after-free. A local attacker could use this flaw to cause
a denial-of-service.
* Memory leak in VFIO driver for P9 Witherspoon machine with NVIDIA V100 GPUs.
A missing free of resources on error path in VFIO driver for P9
Witherspoon machine with NVIDIA V100 GPUs could lead to a memory leak. A
local attacker could use this flaw to exhaust kernel memory and cause a
denial-of-service.
* Buffer overflow in Netfilter flow table mixed IPv4/IPv6 module.
A missing check in Netfilter flow table mixed IPv4/IPv6 module could
lead to a buffer overflow. A local attacker could use this flaw to cause
a denial-of-service.
* Reference count leak in Netfilter flow table mixed IPv4/IPv6 module.
A missing check in Netfilter flow table mixed IPv4/IPv6 module could
lead to a reference count leak. A local attacker could use this flaw to
exhaust kernel memory and cause a denial-of-service.
* NULL pointer dereference when receiving IRQ while registering Intel HD Audio driver.
A logic error when registering Intel HD Audio driver while receiving an
interrupt could lead to a NULL pointer dereference.
* Deadlock in NFS server driver when unlinking a file twice.
A logic error when unlinking a file twice in NFS server could lead to a
deadlock. A local attacker could use this flaw to cause a
denial-of-service.
* NULL pointer dereference when using ChromeOS EC communication protocol helpers.
A missing check when using ChromeOS EC communication protocol helpers
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* Information leak when using untrusted PCI device with Intel IOMMU.
A missing flush of IOTLB when using untrusted PCI device with Intel
IOMMU could lead to an information leak.
* Use-after-free when unregistering Intel PMC IPC driver.
A wrong error path when creating Intel PMC device fails could lead to a
use-after-free when later unregistering Intel PMC IPC driver. A local
attacker could use this flaw to cause a denial-of-service.
* Kernel stack overflow when mounting a F2FS filesystem with data_flush mode.
A logic error when mounting a F2FS filesystem with data_flush mode could
lead to a kernel stack overflow and a kernel panic. A local attacker
could use this flaw to cause a denial-of-service.
* Deadlock when unregistering a PWM device.
A logic error when unregistering a PWM device could lead to a deadlock.
A local attacker could use this flaw to cause a denial-of-service.
* Undefined behavior when converting BPF load instruction.
A logic error when converting BPF load instruction could lead to an
undefined behavior.
* CVE-2019-10126: Heap overflow when parsing IEs in Marvell WiFi-Ex driver.
A missing check when parsing IEs in Marvell WiFi-Ex driver could lead to
a heap overflow. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2019-11477, CVE-2019-11478, CVE-2019-11479: Remote Denial-of-service in TCP stack.
A number of errors in the TCP stack could result in a remotely
triggerable denial of service on links with a small Maximum Segment Size
(MSS). A remote user could use a maliciously crafted TCP stream to
either panic the system or exhaust resources.
A new sysctl, ksplice_net_ipv4.tcp_min_snd_mss can be used to to adjust
the minimum Maximum Segment Size and defaults to 48 bytes.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-29-Updates
mailing list