[Ksplice-Fedora-26-updates] New Ksplice updates for Fedora 26 (4.15.7-200.fc26)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Mar 20 03:08:13 PDT 2018


Synopsis: 4.15.7-200.fc26 can now be patched using Ksplice

Systems running Fedora 26 can now use Ksplice to patch against the
latest Fedora kernel update, 4.15.7-200.fc26.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 26
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service in netfilter getsockopt locking.

Incorrect ordering of mutex locks in the netfilter getsockopt
implementation could result in a deadlock. A local user could use this
flaw to cause a denial-of-service.


* Denial-of-service in public key signature verification.

A logic error when adding a public key to the kernel with an unsupported
hash type can result in an assertion failure or a kernel crash.  A local
user could use this flaw to cause a denial-of-service.


* Authentication bypass in certificate chain validation.

A failure to correctly validate X.509 certificate chains could result in
an invalid certificate chain being incorrectly trusted. A local user
could use this flaw to facilitate a further attack.


* Authentication bypass in certificate blacklist.

A logic error when checking for blacklisted X.509 certificates can
result in ignoring the list of blacklisted certificates. A local user
could use this flaw to facilitate a further attack.


* Use-after-free in RDMA uverbs reference counting.

Incorrect reference count manipulation in the RDMA uverbs implementation
can result in incorrectly using a freed object, leading to a
use-after-free. A local user could use this flaw to potentially escalate
privileges.


* Use-after-free in RDMA uverbs port number lookup.

A failure to validate information provided by userspace can result in a
use-after-free. A local user could use this flaw to potentially escalate
privileges.


* Denial-of-service in RDMA uverbs object allocation.

Incorrect lock ordering when allocating a uverbs object could result in
deadlock. A local user could use this flaw to cause a denial-of-service.


* Denial-of-service in Industrial IO buffer poll implementation.

A logic error int the poll implementation of the Industrial IO subsystem
could result in a NULL pointer dereference leading to a kernel crash. A
local user could use this flaw to cause a denial-of-service.


* Denial-of-service in Direct Rendering Manager node eviction.

A logic error when dealing with holes in the memory layout of DRM nodes
can result in an assertion failure, leading a Kernel crash. A local user
with access to the DRM subsystem could use this flaw to cause a
denial-of-service.


* Denial-of-service in RDMA uverbs error handling locking.

Unbalanced locking in an error path of the the RDMA uverbs
implementation could result in concurrent access to a protected
structure. A local user could use this flaw to cause a kernel crash or
other undefined behaviour.


* Memory corruption with Transparent Huge Pages and zswap.

A logic error when compressing a transparent huge page in zswap can
result in incorrect decompression, resulting in memory corruption
leading to undefined behaviour.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-26-Updates mailing list