[Ksplice][RHEL8-Updates] New Ksplice updates for RHEL 8 (RHSA-2019:2411)

Jamie Iles jamie.iles at oracle.com
Tue Aug 20 05:21:29 PDT 2019


Synopsis: RHSA-2019:2411 can now be patched using Ksplice
CVEs: CVE-2019-1125 CVE-2019-13272

Systems running Red Hat Enterprise Linux 8 can now use Ksplice to
patch against the latest Red Hat Security Advisory, RHSA-2019:2411.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running RHEL 8 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2019-1125: Information leak in kernel entry code when swapping GS.

A local attacker could speculatively access percpu data using a user
defined GS and leak information about running kernel to facilitate an
attack.


* CVE-2019-13272: Privilege escalation via ptrace relationship tracking.

A logic error when recording the ptrace relationship between a privileged
parent and unprivileged child process can result in the ptrace relationship
being incorrectly recorded as privileged. A local user could use this flaw to
escalate privileges or cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.



More information about the Ksplice-RHEL8-Updates mailing list