[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (FEDORA-2018-03a6606cb5)

Oracle Ksplice ksplice-support_ww at oracle.com
Mon Feb 26 07:34:22 PST 2018


Synopsis: FEDORA-2018-03a6606cb5 can now be patched using Ksplice
CVEs: CVE-2017-13166 CVE-2017-16538 CVE-2017-16644 CVE-2018-1000026 CVE-2018-5750

Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2018-03a6606cb5.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Information leak when using CIFS filesystem.

Missing free of resources when using CIFS filesystem could lead to
information leak. A local attacker could use this flaw to leak
information about encrypted data and access it.


* Memory leak when creating an encrypted symlink in UBIFS file system.

A missing free when creating an encrypted symlink in UBIFS file system
could lead to a memory leak. A local attacker could use this flaw to
exhaust kernel memory and cause a denial-of-service.


* CVE-2017-16538: Denial-of-service in DVB-USB subsystem.

A missing warm-start check and incorrect attach timing allows local
users to cause a denial of service (general protection fault and system
crash) or possibly have unspecified other impact via a crafted USB
device.


* CVE-2017-16644: Denial-of-service in Hauppauge HD PVR driver.

Incorrect error handling during device probe for a Hauppauge HD PVR
device could result in a kernel crash.  A user with physical access to
the system and a malicious device could use this flaw to crash the
system.


* CVE-2018-5750: Information leak when registering ACPI Smart Battery System driver.

A too verbose printk when registering ACPI Smart Battery System driver
leaks kernel addresses. A local attacker could use this flaw to
leak information about running kernel and facilitate an attack.


* Denial-of-service when using Metadata Server protocol over NFS.

An error in resources handling when using Metadata Server protocol over
NFS could lead to deadlock. A local attacker could use this flaw to
cause a denial-of-service.


* NULL pointer dereference when registering a key for NFS.

A missing check when registering a key for NFS through keyctl can lead
to a NULL pointer dereference. A local attacker could use this flaw to
cause a denial-of-service.


* Invalid memory access when manipulating /proc/kcore entry.

A logic error when manipulating /proc/kcore entry could lead to an
invalid memory access. A local attacker could use this flaw to cause a
denial-of-service.


* Double free when opening a new kernel relay channel.

A logic error when opening a new kernel relay channel to user space
could lead to a double free. A local attacker could use this flaw to
cause a denial-of-service.


* Denial-of-service when using Packet writing on CD/DVD media.

Logic errors when using Packet writing on CD/DVD media could lead to
NULL pointer dereference or kernel assert. A local attacker could use
this flaw to cause a denial-of-service.


* NULL pointer dereference when cleaning up block queue.

A logic error when cleaning up block queue could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a
denial-of-service.


* Invalid memory access when accessing pseudoterminal.

A wrong error handling when accessing pseudoterminal could lead to an
invalid memory access. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2018-1000026: Denial-of-service when receiving invalid packet on bnx2x network card.

A missing input validation when receiving invalid packet on bnx2x
network card could lead to network outage. A remote attacker could use
this flaw to cause a denial-of-service.


* CVE-2017-13166: Privileges escalation when using V4L2 ioctls.

Logic errors in multiple V4L2 ioctls could lead to arbitrary execution
of user space defined addresses. A local attacker could use this flaw to escalate
privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-26-Updates mailing list