[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (4.15.7-200.fc26)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Mar 20 03:08:13 PDT 2018
Synopsis: 4.15.7-200.fc26 can now be patched using Ksplice
Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, 4.15.7-200.fc26.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Denial-of-service in netfilter getsockopt locking.
Incorrect ordering of mutex locks in the netfilter getsockopt
implementation could result in a deadlock. A local user could use this
flaw to cause a denial-of-service.
* Denial-of-service in public key signature verification.
A logic error when adding a public key to the kernel with an unsupported
hash type can result in an assertion failure or a kernel crash. A local
user could use this flaw to cause a denial-of-service.
* Authentication bypass in certificate chain validation.
A failure to correctly validate X.509 certificate chains could result in
an invalid certificate chain being incorrectly trusted. A local user
could use this flaw to facilitate a further attack.
* Authentication bypass in certificate blacklist.
A logic error when checking for blacklisted X.509 certificates can
result in ignoring the list of blacklisted certificates. A local user
could use this flaw to facilitate a further attack.
* Use-after-free in RDMA uverbs reference counting.
Incorrect reference count manipulation in the RDMA uverbs implementation
can result in incorrectly using a freed object, leading to a
use-after-free. A local user could use this flaw to potentially escalate
privileges.
* Use-after-free in RDMA uverbs port number lookup.
A failure to validate information provided by userspace can result in a
use-after-free. A local user could use this flaw to potentially escalate
privileges.
* Denial-of-service in RDMA uverbs object allocation.
Incorrect lock ordering when allocating a uverbs object could result in
deadlock. A local user could use this flaw to cause a denial-of-service.
* Denial-of-service in Industrial IO buffer poll implementation.
A logic error int the poll implementation of the Industrial IO subsystem
could result in a NULL pointer dereference leading to a kernel crash. A
local user could use this flaw to cause a denial-of-service.
* Denial-of-service in Direct Rendering Manager node eviction.
A logic error when dealing with holes in the memory layout of DRM nodes
can result in an assertion failure, leading a Kernel crash. A local user
with access to the DRM subsystem could use this flaw to cause a
denial-of-service.
* Denial-of-service in RDMA uverbs error handling locking.
Unbalanced locking in an error path of the the RDMA uverbs
implementation could result in concurrent access to a protected
structure. A local user could use this flaw to cause a kernel crash or
other undefined behaviour.
* Memory corruption with Transparent Huge Pages and zswap.
A logic error when compressing a transparent huge page in zswap can
result in incorrect decompression, resulting in memory corruption
leading to undefined behaviour.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-26-Updates
mailing list