[Ksplice-Fedora-28-updates] New Ksplice updates for Fedora 28 (FEDORA-2019-0a771739b5)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Apr 2 12:49:51 PDT 2019


Synopsis: FEDORA-2019-0a771739b5 can now be patched using Ksplice

Systems running Fedora 28 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2019-0a771739b5.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Fedora 28
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Use-after-free when reporting process exit or coredump.

The process event handling code fails to properly synchronize some of
its data structures. In rare cases, this can result in a use-after-free,
potentially resulting in a denial-of-service or information leak.


* NULL-pointer dereference when routing non-local multicast packet.

Due to missing thread synchronization, it is possible for an IPv4
multicast packet to be processed while its ingress device pointer is
NULL, resulting in a kernel crash and denial-of-service.


* Information leak when receiving l2tp packet over IPv6.

When receiving a Layer Two Tunneling Protocol packet over IPv6, the
addr_len field reported to userspace might be uninitialized kernel
memory. A malicious attacker might exploit this to gain information
about the running kernel.


* Undefined behavior when tunneling IPv6 over IPv4 with 6rd.

When tunneling IPv6 over IPv6 utilizing 6rd, the relay_prefixlen field
might be 32, potentially resulting in an outsized shift of a 32-bit
integer, an undefined behavior. This could potentially result in memory
corruption or a denial-of-service.


* Resource leak when destroying PPP socket.

When destroying a Point-to-Point Protocol socket, a missing error
condition could result in a leak of the destination net device
structure, potentially resulting in system instability or a hang.


* Resource leak when deleting FIB nexthop exception.

When removing an entry from the FIB nexthop exception table, a race
condition might cause the destination device structure to become leaked,
potentially resulting in system instability or a denial-of-service.


* NULL-pointer dereference when initializing SCTP stream.

When initializing a Stream Control Transmission Protocol connection, an
unhandled error case could result in a NULL-pointer dereference and
system denial-of-service.


* Denial-of-service when deleting VXLAN device.

If a packet is received on a VXLAN device while it is being deleted, a
race condition might cause an invalid pointer dereference, resulting in
a kernel crash and denial-of-service.


* Invalid memory access when switching between command modes on mlx4.

When switching between the events and polling modes on a Mellanox mlx4
network device, missing synchronization could allow pending callbacks to
point into freed memory, potentially resulting in memory corruption or a
denial-of-service.


* Permissions bypass setting mode on ipvlan slave devices.

The CAP_NET_ADMIN permission is not properly enforced for some on ipvlan
slave devices, potentially allowing a malicious user to change device
mode for other devices in the same ipvlan group.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Fedora-28-Updates mailing list