[Ksplice][Ubuntu-16.04-Updates] New updates available via Ksplice (USN-3099-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Wed Oct 12 01:39:03 PDT 2016


Synopsis: USN-3099-1 can now be patched using Ksplice
CVEs: CVE-2016-6480 CVE-2016-6828 CVE-2016-7039

Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-3099-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 16.04 Xenial
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service in user-space VFIO driver interrupt setup.

Missing validation of user-supplied data could result in incorrectly
configuring interrupts.  A local, privileged user could use this flaw to
crash the system.


* Use-after-free in ACPI PCC channel request error handling.

Incorrect error handling could result in dereferencing an invalid
pointer and crashing the system under specific conditions.


* Memory leak in USB hub disconnection.

A race condition when handling removal of a USB hub could result in
leaking a memory allocation.  A local user with physical access to the
system could potentially use this flaw to exhaust memory and trigger a
denial-of-service.


* Denial-of-service in USB endpoint parsing.

Missing validation of the endpoint maximum packet size could result in a
denial-of-service when a user could attach malicious USB devices to the
system.


* NULL pointer dereference in USB XHCI disconnection.

A race condition when disconnecting XHCI devices could result in a NULL
pointer dereference and kernel crash.


* Kernel hang in XHCI PCI device disconnection.

Incorrect handling of device quirks could result in a kernel hang when
removing specific USB devices from the system.


* Memory leak in USB serial port driver registration failure.

Missing resource cleanup on registration failure could result in failure
to return allocated memory.  A malicious user with physical access to
the system could use this flaw to cause a denial-of-service.


* Denial-of-service in AMD graphics connector detection.

Missing validation could result in an out-of-bounds access and kernel
crash when detecting a connector.


* CVE-2016-6480: Denial-of-service in Adaptec AACRAID driver.

A race condition in fetching parameters from userspace could result in
accessing beyond the bounds of a buffer.  A local user with privileges
to access the device could use this flaw to crash the system.


* Kernel crash in LSI MTP Fusion SAS 3.0 WarpDrive resume.

A logic error in the resume path for WarpDrive devices could result in
accessing a stale pointer and kernel crash on resume from suspend.


* Information leak in seq_file reading.

A logic error in the seq_file read implementation could result in
leaking information from beyond the end of the buffer.  A local,
unprivileged user could use this flaw to gain sensitive kernel
information.


* Denial-of-service in Moschip USB serial writing.

Incorrect memory allocations could result in deadlock and a kernel crash
when writing to the port.


* Use-after-free in Line6 USB volume controls.

Incorrect reference counting in the Line6 USB volume control could
result in prematurely freeing the USB device and causing a kernel crash.
A local user with privileges to access the device could use this flaw to
crash the system.


* Kernel crash in Line6 USB audio device stream stopping.

Missing locking in the Line6 USB audio device driver whilst stopping a
stream could result in recursive locking and a kernel crash.


* Kernel crash in Line6 USB audio device sysfs attributes.

Incorrect typecasting of pointers could result in a dereference of an
invalid pointer and kernel crash.  A local, unprivileged user could use
this flaw to crash the system or leak sensitive kernel data.


* Denial-of-service in ext4 xattr manipulation.

A logic error when expanding the size of an extended attribute can
cause a kernel deadlock or assertion fail which triggers a kernel panic.


* Data loss in ext4 checksum verification.

Invalid locking can cause checksum verification to incorrectly fail
which could lead to data loss on ext4 filesystems.


* Denial of service in Direct Rendering Manager CRTC.

A logic error when attempting to flip pages on a device which does not
support modeset can trigger a kernel panic.


* Denial-of-service in uprobes memory control group accounting.

Incorrect interaction with the memory control group subsystem could
result in an integer overflow and memory exhaustion.  A local,
privileged user could use this flaw to trigger a denial-of-service.


* Deadlock in FireWire TASCAM devices.

Incorrect locking when accessing userspace can trigger a deadlock and
kernel panic when reading from a FireWire TASCAM device.


* Use after free in ALSA timer SELECT ioctl.

Missing locking when handling the SNDRV_TIMER_IOCTL_SELECT ioctl in the
ALSA subsystem can trigger a use-after-free and kernel panic.


* CVE-2016-6828: Use after free during TCP transmission.

A logic error when a memory allocation fails during TCP transmission can
cause the kernel TCP stack to use freed memory causing a kernel panic.


* Denial of service in ALSA timer CONTINUE ioctl.

A division by zero and kernel panic can be triggered when the ALSA
subsystem handles the SNDRV_TIMER_IOCTL_CONTINUE ioctl.


* Denial of service in ALSA device opening under memory pressure.

A logic error in the ALSA subsystem can trigger a NULL pointer
dereference and kernel panic when a memory allocation fails.


* Denial-of-service in malformed overlayfs extended attributes.

The overlay filesystem does not correctly handle malformed extended
attributes from the lower filesystem which can trigger an assertion
failure and kernel panic.


* Denial-of-service in CIFS filesystem mounting error handling.

Failure to free memory allocations when handling errors during CIFS mounting
could result in memory exhaustion.  A local user with privileges to mount
filesystems could use this flaw to crash the system.


* CIFS Distributed Filesystem mounting failure.

Missing path comparisons during CIFS Distributed Filesystem mounting could
result in failure to mount a volume.


* Kernel crash in nvme device removal.

An error caused early on when probing an nvme device could cause a queue to
be suspended before it has been initialised.


* Kernel crash when adding unsorted pages to a HyperV guest.

Incorrect handling of unsorted pages could result in a kernel crash when
adding pages to a HyperV guest during balloon deflation.


* Undefined behaviour in Multiprecision maths library.

Failure to handle leading zeros in MPI values could result in undefined
behaviour under specific conditions.


* Denial-of-service in overlapping EXT4 filesystems with data and superblocks.

A malformed EXT4 filesystem with overlapping data and superblocks could
result in triggering kernel assertions and crashing the system.  A local
user with the ability to mount filesystems could use this flaw to trigger a
denial-of-service.


* Denial-of-service in Huge TLB mappings during process exit.

Incorrect reference counting on shared page tables could result in
triggering a kernel assertion and crash when exiting a process.  A local,
unprivileged user could use this flaw to crash the system.


* Kernel crash in block multiqueue queue initialization.

Incorrect handling of CPU masks could result in dereferencing invalid memory
addresses and crashing the kernel when mapping a software queue.


* Kernel hang when block layer queue is being frozen.

A reference acquired whilst a queue freeze is starting is never released,
causing the queue freeze to hang forever.


* Memory leak in HyperV PCI driver during event handling.

Failure to free resources in the HyperV PCI driver during event handling could
result in a memory leak and eventual memory exhaustion.  Under specific
conditions this could result in a kernel crash.


* CVE-2016-7039: Kernel crash due to unbounded recursion in vlan GRO processing.

Linux kernel built with the 802.1Q/802.1ad VLAN OR Virtual eXtensible LAN
with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack
overflow issue, leading to a stack corruption in the kernel.

A remote user could use this flaw to cause kernel panic by sending malicious
packets to a server that has GRO enabled.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Ubuntu-16.04-updates mailing list