[Ksplice-Fedora-21-updates] New updates available via Ksplice (FEDORA-2015-4887)

Oracle Ksplice ksplice-support_ww at oracle.com
Wed Apr 1 16:35:51 PDT 2015


Synopsis: FEDORA-2015-4887 can now be patched using Ksplice

Systems running Fedora 21 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2015-4887.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Fedora 21 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service in network packet transmission and reception.

Missing validation of the net.core.rmem_default and
net.core.wmem_default controls could allow a local, privileged user to
trigger a denial-of-service by setting low values for these parameters
and sending or receiving large packets.


* Use-after-free in virtio-net module unloading.

Missing cleanup on module unload could allow asynchronous work to
continue after the module had loaded causing a kernel crash.


* Kernel crash in IPv4 socket monitoring interface.

Incorrect allocation could result in a heap overflow and subsequent
kernel crash when receiving diagnostics for an IPv4 socket.


* Kernel crash during IPv6 UDP offloading fragmentation.

Under specific conditions, the kernel could crash when performing
fragmentation when UDP offloading was enabled for an IPv6 connection.


* Kernel crash in compat sendmsg/recvmsg calls.

Incorrect validation of user supplied data could result in memory
corruption when sending or receiving messages to a datagram socket and
the audit subsystem was enabled.


* NULL pointer dereference in Radeon DRM_IOCTL_RADEON_CS ioctl().

Incorrect initialization could result in a NULL pointer dereference when
performing a DRM_IOCTL_RADEON_CS ioctl().  A local user with access to
the DRM device could use this flaw to trigger a denial-of-service
attack.


* Kernel crash in LZ4 decompression.

Incorrect handling of invalid LZ4 data could result in accessing invalid
memory and a page fault.


* Kernel crash in kernel function graph tracer during enabling.

The kernel function graph tracer did not correctly handle changing the
tracer when ftrace was disabled.  A local, privileged user could use
this flaw to crash the system.


* Kernel crash in controller area network (CAN) sockets.

Incorrect initialization of CAN sockets could result in a kernel crash
when using AF_PACKET sockets.


* NULL pointer dereference in Synopsys DesignWare SPI DMA allocation failure.

The Synopsys DesignWare SPI driver did not correctly handle DMA
allocation failures, resulting in a NULL pointer dereference when under
memory pressure.


* Deadlock during NILFS2 filesystem recovery.

Mounting a NILFS2 filesystem could cause deadlock if roll-forward
recovery was required.  This could happen after a crash during a
datasync write.


* NULL pointer dereference in Xen event channel on large systems.

Large systems could fail to allocate a port IRQ for a Xen event channel
under specific conditions.  This could result in a NULL pointer
dereference and kernel crash.


* Kernel crash in SAS driver during expander discovery.

Incorrect handling of expander device discovery could result in a NULL
pointer dereference and kernel crash.


* Denial-of-service in PCI device sysfs "driver_override" attribute.

Missing length validation of the "driver_override" attribute in a PCI
device sysfs entry could result in accessing invalid memory and
triggering a kernel crash.  A local, unprivileged user could use this
flaw to trigger a denial-of-service under specific conditions.


* Information leak in /proc/PID/pagemap.

/proc/PID/pagemap includes the virtual to physical mappings and could be
accessed by a local, unprivileged user.  This could be used in
conjuction with flaws such as ROWHAMMER to elevate privileges.


* Denial-of-service in Intel AES RFC4106 decryption.

Incorrect mapping of buffers in the Intel AES RFC4106 implementation
could result in a kernel crash.  A local, unprivileged user with access
to AF_ALG(aead) sockets could use this flaw to trigger a
denial-of-service.


* Denial-of-service in Intel Memory Protection Extensions.

Incorrect checking for user mode tasks could result in a
denial-of-service when handling bounds faults on a system with MPX
available.


* Resource leak in IP virtual server backup sync protocol.

Missing resource freeing could result in a memory leak and failure to
remove an IP virtual server instance.


* Kernel crash in netfilter socket matching.

Incorrect use of stack-allocated variables could result in accessing
stale data.  This could potentially be used by a local, privileged user
to cause a denial-of-service or potentially, escalate privileges.


* Use-after-free in netfilter nf_tables table commit/abort.

A number of of flaws in netfilter nf_tables commit/abort handling could
result in a use-after-free condition and kernel crash.


* NULL pointer dereference during Target device initialization failure.

Failure to create a workqueue when initializing a target device could
result in a NULL pointer dereference and kernel crash under specific
conditions.


* Use-after-free in ISCSI target connection closing.

A race condition in the ISCSI target connection closing procedure could
result in a use-after-free condition and subsequent kernel crash.


* Denial-of-service in pSCSI backend.

A missing NULL pointer check could result in a denial-of-service,
triggerable by a local, unprivileged user for incomplete configurations.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Fedora-21-Updates mailing list