[Ksplice-Fedora-21-updates] New updates available via Ksplice (3.18.5-201.fc21)

Oracle Ksplice ksplice-support_ww at oracle.com
Sat Feb 7 16:04:22 PST 2015


Synopsis: 3.18.5-201.fc21 can now be patched using Ksplice
CVEs: CVE-2014-8480 CVE-2015-0239 CVE-2015-1465

Systems running Fedora 21 can now use Ksplice to patch against the
latest Fedora kernel update, 3.18.5-201.fc21.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Fedora 21 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* NULL pointer dereference in nl80211 when parsing invalid sched scan request.

Lack of proper input validation in the nl80211 stack could lead to a NULL
pointer dereference when parsing an invalid sched scan request.  A local,
privileged user could use this flaw to cause a denial-of-service.


* Memory leak in cfg80211 when processing an already set driver hint.

Lack of verification that a driver hint is already set in the cfg80211
stack leads to a memory leak. A local, privileged user could use this flaw
to exhaust the memory on the system and cause a denial-of-service.


* Use-after-free when reading from /proc/interrupts.

A lack of proper synchronization between the generic IRQ subsystem when
releasing an interrupt descriptor and reading the interrupt descriptor from
/proc/interrupts could lead to a use-after-free and potentially kernel
crash.


* Memory corruption in SCSI library when clearing scatter gather segment.

Lack of bounds testing when using an index inside a scatter gather array of
segments could lead to random memory corruption and kernel panic.


* Possible deadlock when registering a debug clock.

Incorrect locking when registering a debug clock could lead to a kernel
deadlock and denial-of-service under certain circumstances.


* Use-after-free when releasing a clock.

A logic error in the clock driver when releasing a clock leads to a
use-after-free and possible kernel panic.


* Use-after-free in USB Video Class driver when removing a device.

Incorrect ordering when removing sysfs device when disconnecting a webcam
leads to use-after-free and potentially kernel panic.


* NULL pointer dereference in file locking support when removing a lease.

A logic error in the virtual filesystem locking support could lead to a
NULL pointer dereference under certain circumstances.  A local user could
this flaw to cause a denial-of-service.


* Deadlock when unregistering GPIO chip.

Incorrect locking in the kernel GPIO driver when unregister a GPIO chip
can trigger a deadlock and kernel panic.


* NULL pointer dereference in Keyspan SB driver.

A race condition when initializing a Keyspan USB serial device can
trigger a NULL pointer dereference and kernel panic.


* Deadlock when configuring line discipline of USB console device.

A kernel lock is not correctly initialized when a USB console device is
initialized. This can later trigger a deadlock when a user attempts to
configure a line discipline for the console device.


* Off-by-one in kernel bunzip2 decompressor.

The kernel bunzip2 decompressor does not correctly validate offsets when
decompressing data which can lead to an out-of-bound read and possible
kernel panic.


* Deadlock when unregistering pin control devices.

Incorrect locking when the kernel pin control (pinctrl) driver attempts
to unregister a device can trigger a deadlock and kernel panic.


* Deadlock when suspending Realtek USB card readers.

The kernel driver for Realtek USB card reader devices incorrectly holds
a lock which can trigger a deadlock and kernel panic.


* Kernel panic when flushing SFF ATA devices.

Incorrect locking when flushing Small Form Factor ATA devices can
trigger a BUG_ON and kernel panic.


* Integer overflow in adjtimex syscall.

The adjtimex syscall does not validate the 'freq' argument which can
allow a malicious local user to set the clock frequency to an invalid
value.


* Deadlock in CIFS COPYCHUNK_FILE ioctl.

The CIFS filesystem COPYCHUNK_FILE ioctl does not validate that the file
descriptor arguments are regular files which can trigger a deadlock and
kernel panic.


* CVE-2015-0239: Privilege escalation in KVM sysenter emulation.

The KVM emulation of the sysenter instruction does not validate 16-bit
code segments which can allow a local attacker to potentially elevate
privileges.


* Improved fix for CVE-2014-8480: Guest triggerable kernel panic in KVM instruction decoder.

An incomplete fix was applied for CVE-2014-8480 which can allow a
malicious KVM guest to trigger a kernel panic in the host when decoding
SLDT and STR instructions.


* Kernel panic when filtering netlink packets.

The kernel netlink netfilter implementation does not correctly validate
the length of received netlink packets which can trigger an out-of-
bounds read and possible kernel panic.


* Use-after-free when flushing netfilter rules.

The kernel netfilter implementation frees kernel resources in an
incorrect order which can trigger a use-after-free condition and
possible kernel panic when flushing a netfilter table.


* Kernel panic in netfilter connection tracking.

A race condition when establishing a new connection and flushing
netfilter connection tracking information can trigger a kernel panic.


* CVE-2015-1465: Denial of service in IPv4 packet forwarding.

A remote user can trigger a denial-of-service by sending a large number
of packets needing redirection which triggers high CPU load.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Fedora-21-Updates mailing list