[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (FEDORA-2018-ba39fc0e07)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Apr 6 05:33:02 PDT 2018
Synopsis: FEDORA-2018-ba39fc0e07 can now be patched using Ksplice
Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2018-ba39fc0e07.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Memory leak when using zoned block device over SCSI.
A missing freeing of resources when using zoned block device over SCSI
could lead to a memory leak. A local attacker could use this flaw to
exhaust kernel memory and cause a denial-of-service.
* Memory corruption when mapping blocks in GFS2 file systems.
A logic error when mapping blocks in GFS2 file systems could lead to a
memory corruption. A local attacker could use this flaw to cause a
denial-of-service or corrupt on-disk data.
* NULL pointer dereference when using Realtek RTL8822BE Wireless Network Adapter.
A missing check when using Realtek RTL8822BE Wireless Network Adapter
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* NULL pointer dereference when generating ECDH algorithm private key.
A logic error when generating ECDH algorithm private key could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.
* Use-after-free when changing CPU frequency governor.
A race condition when changing CPU frequency governor could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Use-after-free when unloading Emulex LightPulse Fibre Channel driver.
A missing check when unloading Emulex LightPulse Fibre Channel driver
while NVME traffic is on-going could lead to a use-after-free. A local
attacker could use this flaw to cause a denial-of-service.
* Use-after-free when unloading AMD display controller engine driver.
A missing check when unloading AMD display controller engine (DCE)
driver could lead to a use-after-free. A local attacker could use this
flaw to cause a denial-of-service.
* Denial-of-service when changing virtual interface in Marvell WiFi-Ex driver.
A missing check when changing virtual interface in Marvell WiFi-Ex
driver while a scan request is in progress could lead to a kernel crash.
A local attacker could use this flaw to cause a denial-of-service.
* Out-of-bounds access when using CPiA2 Video For Linux.
A missing check when using CPiA2 Video For Linux could lead to an
out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service when setting up an invalid mac80211 interface.
A logic error when setting up an invalid mac80211 interface could lead
to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.
* Use-after-free when getting PCM formats in OSS PCM driver.
A logic error when getting PCM formats in OSS PCM driver could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Use-after-free when using ALSA sequencer Priority Queue.
A race condition when using ALSA sequencer Priority Queue could lead to
a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* NULL pointer dereference when unbinding Nouveau driver.
A missing list initialization when unbinding Nouveau GPU driver could
lead to a NULL pointer dereference. A local attacker could use this flaw
to cause a denial-of-service.
* Memory corruption in filesystem dcache.
A locking error in filesystem dcache could lead to a memory corruption.
A local attacker could use this flaw to cause a denial-of-service.
* Use-after-free when freeing a region in RDMA verbs transport library.
A missing check when freeing a region in RDMA verbs transport library
could lead to a use-after-free. A local attacker could use this flaw to
cause a denial-of-service.
* NULL pointer dereference when removing a disk from a BTRFS RAID6.
A missing check when removing a disk from a BTRFS RAID6 could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.
* Use-after-free when cleaning up unmounted BTRFS filesystems.
A logic error when cleaning up unmounted BTRFS filesystems could lead to
a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service when doing maintenance operations on BTRFS.
A too verbose kernel assert when doing maintenance operations on BTRFS
could lead to a kernel log flood. A local attacker could use this flaw
to cause a denial-of-service.
* NULL pointer dereferences when using QLogic QLA2XXX Fibre Channel.
Multiple logic errors when using QLogic QLA2XXX Fibre Channel could lead
to NULL pointer dereferences. A local attacker could use this flaw to
cause a denial-of-service.
* Memory leak when using AMD Kernel Fusion Driver.
A missing release of resources when using AMD Kernel Fusion Driver could
lead to a memory leak. A local attacker could use this flaw to exhaust
kernel memory and cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-26-Updates
mailing list