[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (FEDORA-2018-ba39fc0e07)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Apr 6 05:33:02 PDT 2018


Synopsis: FEDORA-2018-ba39fc0e07 can now be patched using Ksplice

Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2018-ba39fc0e07.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Memory leak when using zoned block device over SCSI.

A missing freeing of resources when using zoned block device over SCSI
could lead to a memory leak. A local attacker could use this flaw to
exhaust kernel memory and cause a denial-of-service.


* Memory corruption when mapping blocks in GFS2 file systems.

A logic error when mapping blocks in GFS2 file systems could lead to a
memory corruption. A local attacker could use this flaw to cause a
denial-of-service or corrupt on-disk data.


* NULL pointer dereference when using Realtek RTL8822BE Wireless Network Adapter.

A missing check when using Realtek RTL8822BE Wireless Network Adapter
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.


* NULL pointer dereference when generating ECDH algorithm private key.

A logic error when generating ECDH algorithm private key could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.


* Use-after-free when changing CPU frequency governor.

A race condition when changing CPU frequency governor could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* Use-after-free when unloading Emulex LightPulse Fibre Channel driver.

A missing check when unloading Emulex LightPulse Fibre Channel driver
while NVME traffic is on-going could lead to a use-after-free. A local
attacker could use this flaw to cause a denial-of-service.


* Use-after-free when unloading AMD display controller engine driver.

A missing check when unloading AMD display controller engine (DCE)
driver could lead to a use-after-free.  A local attacker could use this
flaw to cause a denial-of-service.


* Denial-of-service when changing virtual interface in Marvell WiFi-Ex driver.

A missing check when changing virtual interface in Marvell WiFi-Ex
driver while a scan request is in progress could lead to a kernel crash.
A local attacker could use this flaw to cause a denial-of-service.


* Out-of-bounds access when using CPiA2 Video For Linux.

A missing check when using CPiA2 Video For Linux could lead to an
out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service.


* Denial-of-service when setting up an invalid mac80211 interface.

A logic error when setting up an invalid mac80211 interface could lead
to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.


* Use-after-free when getting PCM formats in OSS PCM driver.

A logic error when getting PCM formats in OSS PCM driver could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* Use-after-free when using ALSA sequencer Priority Queue.

A race condition when using ALSA sequencer Priority Queue could lead to
a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* NULL pointer dereference when unbinding Nouveau driver.

A missing list initialization when unbinding Nouveau GPU driver could
lead to a NULL pointer dereference. A local attacker could use this flaw
to cause a denial-of-service.


* Memory corruption in filesystem dcache.

A locking error in filesystem dcache could lead to a memory corruption.
A local attacker could use this flaw to cause a denial-of-service.


* Use-after-free when freeing a region in RDMA verbs transport library.

A missing check when freeing a region in RDMA verbs transport library
could lead to a use-after-free. A local attacker could use this flaw to
cause a denial-of-service.


* NULL pointer dereference when removing a disk from a BTRFS RAID6.

A missing check when removing a disk from a BTRFS RAID6 could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.


* Use-after-free when cleaning up unmounted BTRFS filesystems.

A logic error when cleaning up unmounted BTRFS filesystems could lead to
a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* Denial-of-service when doing maintenance operations on BTRFS.

A too verbose kernel assert when doing maintenance operations on BTRFS
could lead to a kernel log flood. A local attacker could use this flaw
to cause a denial-of-service.


* NULL pointer dereferences when using QLogic QLA2XXX Fibre Channel.

Multiple logic errors when using QLogic QLA2XXX Fibre Channel could lead
to NULL pointer dereferences. A local attacker could use this flaw to
cause a denial-of-service.


* Memory leak when using AMD Kernel Fusion Driver.

A missing release of resources when using AMD Kernel Fusion Driver could
lead to a memory leak. A local attacker could use this flaw to exhaust
kernel memory and cause a denial-of-service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-26-Updates mailing list