[El-errata] New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2019-4836)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed Nov 13 09:47:40 PST 2019
Synopsis: ELSA-2019-4836 can now be patched using Ksplice
CVEs: CVE-2018-12207 CVE-2019-11135 CVE-2019-14284 CVE-2019-15916
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2019-4836.
More information about this errata can be found at
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2018-12207: Machine Check Exception on page size change.
A hardware bug in Intel x86 processors can result in a Machine Check Exception
when a page table mapping for currently executing instructions is changed. A
privileged user in a guest VM could use this flaw to crash the host, leading to
* CVE-2019-15916: Memory leak when registering a kobject associated to a net device.
A missing free of resources when registering a kobject for a net device
fails could lead to a memory leak. A local attacker could use this flaw
to exhaust kernel memory and cause a denial-of-service.
* Kernel crash in Reliable Datagram Socket RDMA pool management.
A logic error when tracking items in an RDMA pool can result in a reference
count exceeding its maximum limit, leading to a kernel crash.
* Information leak in LSI MPT Fusion SAS ioctl() handling.
A race condition when validating device identifiers could allow a local
user with access to one device to perform commands on another device
that they should not have permission for.
* CVE-2019-14284: Denial-of-service in floppy disk formatting.
A division by zero in the setup_format_params function for the floppy
disk driver could result in a kernel crash. A local user with access to
the floppy disk device could use this flaw to crash the system.
* Use-after-free during mpt3sas expander reset.
A failure to correctly clear memory when performing a reset of an mpt3sas
expander could result in the access of freed memory, leading to a
undefined behavior or a kernel crash.
* NULL pointer dereference during ring buffer iteration in XEN network frontend driver.
A logic error in the Xen network frontend driver resulted in a valid return code to
be interpreted as an error. In certain circumstances, this could lead to a NULL
pointer dereference, resulting in a kernel crash.
* Denial-of-service when receiving packets over tcp sockets.
A logic error when receiving packets over tcp sockets could lead to a
kernel assert. A local attacker could use this flaw to cause a
* Kernel crash in MPT3SAS when HBA doesn't support NVMe protocol.
If any faulty application issues an NVMe Encapsulated commands to HBA which
doesn't support NVMe protocol then a kernel crash might happen due to missing
* CVE-2019-11135: Side-channel information leak in Intel TSX.
A side-channel information leak on some generations of Intel processors
could allow the leaking of internal microarchitectural buffers during
asynchronous aborts in a TSX transaction. For CPUs that are vulnerable
to Microarchitectural Data Sampling, existing mitigations cover
CVE-2019-11135, for newer CPUs with hardware fixes for MDS, TSX is
transparently disabled. On these newer CPUs, TSX functionality can be
restored by writing 0 to /sys/kernel/debug/x86/tsx_force_abort.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata