[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (FEDORA-2018-03a6606cb5)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Feb 26 07:34:22 PST 2018
Synopsis: FEDORA-2018-03a6606cb5 can now be patched using Ksplice
CVEs: CVE-2017-13166 CVE-2017-16538 CVE-2017-16644 CVE-2018-1000026 CVE-2018-5750
Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2018-03a6606cb5.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Information leak when using CIFS filesystem.
Missing free of resources when using CIFS filesystem could lead to
information leak. A local attacker could use this flaw to leak
information about encrypted data and access it.
* Memory leak when creating an encrypted symlink in UBIFS file system.
A missing free when creating an encrypted symlink in UBIFS file system
could lead to a memory leak. A local attacker could use this flaw to
exhaust kernel memory and cause a denial-of-service.
* CVE-2017-16538: Denial-of-service in DVB-USB subsystem.
A missing warm-start check and incorrect attach timing allows local
users to cause a denial of service (general protection fault and system
crash) or possibly have unspecified other impact via a crafted USB
device.
* CVE-2017-16644: Denial-of-service in Hauppauge HD PVR driver.
Incorrect error handling during device probe for a Hauppauge HD PVR
device could result in a kernel crash. A user with physical access to
the system and a malicious device could use this flaw to crash the
system.
* CVE-2018-5750: Information leak when registering ACPI Smart Battery System driver.
A too verbose printk when registering ACPI Smart Battery System driver
leaks kernel addresses. A local attacker could use this flaw to
leak information about running kernel and facilitate an attack.
* Denial-of-service when using Metadata Server protocol over NFS.
An error in resources handling when using Metadata Server protocol over
NFS could lead to deadlock. A local attacker could use this flaw to
cause a denial-of-service.
* NULL pointer dereference when registering a key for NFS.
A missing check when registering a key for NFS through keyctl can lead
to a NULL pointer dereference. A local attacker could use this flaw to
cause a denial-of-service.
* Invalid memory access when manipulating /proc/kcore entry.
A logic error when manipulating /proc/kcore entry could lead to an
invalid memory access. A local attacker could use this flaw to cause a
denial-of-service.
* Double free when opening a new kernel relay channel.
A logic error when opening a new kernel relay channel to user space
could lead to a double free. A local attacker could use this flaw to
cause a denial-of-service.
* Denial-of-service when using Packet writing on CD/DVD media.
Logic errors when using Packet writing on CD/DVD media could lead to
NULL pointer dereference or kernel assert. A local attacker could use
this flaw to cause a denial-of-service.
* NULL pointer dereference when cleaning up block queue.
A logic error when cleaning up block queue could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a
denial-of-service.
* Invalid memory access when accessing pseudoterminal.
A wrong error handling when accessing pseudoterminal could lead to an
invalid memory access. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2018-1000026: Denial-of-service when receiving invalid packet on bnx2x network card.
A missing input validation when receiving invalid packet on bnx2x
network card could lead to network outage. A remote attacker could use
this flaw to cause a denial-of-service.
* CVE-2017-13166: Privileges escalation when using V4L2 ioctls.
Logic errors in multiple V4L2 ioctls could lead to arbitrary execution
of user space defined addresses. A local attacker could use this flaw to escalate
privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-26-Updates
mailing list