[Ksplice][Ubuntu-13.10-Updates] New updates available via Ksplice (USN-2179-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Apr 28 02:47:25 PDT 2014
Synopsis: USN-2179-1 can now be patched using Ksplice
CVEs: CVE-2014-0049 CVE-2014-0069
Systems running Ubuntu 13.10 Saucy can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-2179-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 13.10 Saucy
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Deadlock in PCI DMA subsystem when allocating a DMA buffer.
A logic error in the PCI DMA architecture dependent code could lead to a
deadlock.
* Deadlock in ext4 filesystem in swap_inode_boot_loader() error path.
Incorrect locking in the error path of swap_inode_boot_loader() leaves a
mutex unlocked leading to a deadlock. A local, privileged user could use
this flaw to cause a denial-of-service.
* CVE-2014-0069: Denial-of-service in CIFS filesystem on uncached writes.
A lack of input validation in the CIFS filesystem code could lead to memory
corruption and kernel crash. A local, unprivileged user could use this flaw
to cause a denial-of-service.
* Data corruption in ext4 when resizing with non-standard blocks-per-group number.
A flaw in the ext4 resizing code could lead to data corruptions when the
number of blocks per group is not 8.
* Use-after-free in JDB2 transaction code.
A flaw in the JBD2 code could lead to a use-after-free and kernel crash. A
local, privileged user could use this flaw to cause a denial-of-service.
* Memory leak in ACPI PCI when enabling IRQ.
A flaw in the ACPI PCI IRQ driver could lead to leak memory. A local,
privileged user could use this flaw to exhaust the memory on the system and
cause a denial-of-service.
* Use-after-free in Intel MEI driver on send flow control failure.
A flaw in the MEI driver could lead to a use-after-free and kernel crash. A
local privileged user could use this flaw to cause a denial-of-service.
* Deadlock in the tg3 ethernet driver when changing the MTU.
Incorrect locking in the tg3 ethernet driver could lead to a deadlock when
changing the MTU. A local, privileged user could use this flaw to cause a
denial-of-service.
* Denial-of-service in KVM with nested VMs.
A missing check in the KVM MMU code could lead to a kernel crash. A local,
privileged user could use this flaw to cause a denial-of-service.
* Use-after-free in STE DMA driver tasklet.
A flaw in the STE DMA driver results in a use-after-free and potentially to
a kernel crash.
* Deadlock in Arizona haptics input driver.
A flaw in the Arizona haptics input driver leads to a double mutex_lock()
resulting in a deadlock and denial-of-service.
* Denial-of-service in QLogic driver on selective retransmission request.
A missing check in the QLogic driver code results in NULL pointer
dereference and kernel crash. A remote user could use this flaw to cause a
denial-of-service.
* Use-after-free in i7 EDAC driver when iterating PCI devices.
Due to incorrect reference counting in the i7 EDAC driver, a use-after-free
could result in a kernel crash and denial-of-service.
* Deadlock in firmware class driver on suspend path.
A flaw in the firmware class driver results in a deadlock and kernel
hang. A local, privileged user could use this flaw to cause a
denial-of-service.
* Denial-of-service in perf subsystem when hotplugging CPU.
Incorrect locking in the perf subsystem could lead to use-after-free and
kernel crash when hotplugging a CPU. A local, privileged user could use
this flaw to cause a denial-of-service.
* CVE-2014-0049: Code execution in KVM mmio emulator.
A logic error in the KVM code could lead to out of bounds memory accesses,
resulting in a kernel crash or potentially allowing a local user to write
in the host memory. A local, privileged user could use this flaw to elevate
privileges and execute arbitrary code in kernel mode.
* Denial-of-service in Radeon DRM driver when opening mode setting interface.
A flaw in the Radeon DRM driver could lead to a kernel crash on opening the
kernel mode setting interface. A local, privileged user could use this flaw
to cause a denial-of-service.
* Denial-of-service in net core when allocating sk_buff under memory pressure.
A flaw in the net core subsystem when allocating a sk_buff under memory
pressure could lead to trigger OOM and potentially result in a
denial-of-service.
* Denial-of-service in cgroup subsystem when adding a cgroup to a task.
Incorrect locking in the cgroup subsystem could lead to list corruptions
and kernel crash under specific conditions. A local, unprivileged user
could use this flaw to cause a denial-of-service.
* Denial-of-service in ext4 when resizing with large inode tables.
A flaw in the ext4 code when resizing a filesystem with large number of
inodes per block group could lead to a kernel BUG. A local, privileged user
could use this flaw to cause a denial-of-service.
* Deadlock in EHCI USB2 controller driver when handling an interrupt.
Incorrect locking in the EHCI driver code could lead to a deadlock,
resulting in a denial-of-service under specific conditions.
* Denial-of-service in perf subsystem when updating the maximum sample rate.
Incorrect input validation in the perf subsystem when
perf_event_max_sample_rate is updated with a value less or equal than zero,
causes a division by zero in kernel. A local, privileged user could use
this flaw to cause soft-lockups and a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-13.10-Updates
mailing list