[Ksplice][Ubuntu-18.04-Updates] New Ksplice updates for Ubuntu 18.04 Bionic (4.15.0-48.51)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Apr 26 11:10:16 PDT 2019


Synopsis: 4.15.0-48.51 can now be patched using Ksplice
CVEs: CVE-2017-5715 CVE-2018-3620 CVE-2018-3646

Systems running Ubuntu 18.04 Bionic can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.15.0-48.51.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 18.04
Bionic install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service in FSCache object lookup.

A race condition between looking up and dropping an object from an FSCache
instance can lead to a kernel hang. A local user could use this flaw to cause a
denial-of-service.


* Improved fix to CVE-2018-3620, CVE-2018-3646: Information leak in Intel CPUs under terminal fault.

The original fix for L1 Terminal Fault/Foreshadow could prevent loading
of microcode when hyperthreading was disabled or failure to mprotect
specific memory mappings.


* Denial-of-service in x86 NMI handler.

A race condition in the x86 NMI handler can potentially lead to a process
copying from the wrong location in memory.  This could potentially be exploited
to cause a denial-of-service.


* Improved fix for CVE-2017-5715: Information leak due to missing IBPB calls in SVM.

A potential Spectre v2 attack vector exists in the KVM code that
supports SVM-enabled processors, due to a failure to call
indirect_branch_prediction_barrier when freeing vcpus.  This can be
exploited by a local attacker to leak information about the running
system.


* NULL pointer dereference in AMD IOMMU ACPI device matching.

A missing NULL pointer dereference could result in a kernel crash when
attempting to matching IDs for an ACPI device.


* Note: Ksplice will not add the STIBP support for CVE-2017-5715.

Ksplice will not add support for the Intel STIBP feature which provides
Spectre hardening for user-space processes.  Administrators wishing to
provide protection between user-space processes may disable
hyperthreading with:

  echo off > /sys/devices/system/cpu/smt/control

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-18.04-updates mailing list