[Ksplice][Ubuntu-16.04-Updates] New Ksplice updates for Ubuntu 16.04 Xenial (4.4.0-139.165)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Jan 14 23:13:59 PST 2019
Synopsis: 4.4.0-139.165 can now be patched using Ksplice
CVEs: CVE-2018-10880 CVE-2018-13053 CVE-2018-14617 CVE-2018-14633
Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.4.0-139.165.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 16.04
Xenial install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2018-14617: Denial-of-service in HFS+ filesystem mounting.
A logic error when mounting an HFS+ filesystem could result in a NULL
pointer dereference and kernel crash. A local user with the ability to
mount filesystems could use this flaw to crash the system with a
maliciously crafted filesystem image.
* NULL pointer dereference in BTRFS relocation cleanup.
A missing NULL pointer check could result in a kernel crash when
mounting a corrupted filesystem. A user with the ability to mount
filesystems could use this flaw to crash the system with a maliciously
crafted image.
* Use-after-free when releasing device in USB XHCI driver.
A logic error when releasing device in USB XHCI driver could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service when an I/O error happens while reading OCFS2 block.
A logic error when an I/O error happens while reading OCFS2 block could
lead to a kernel assert. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2018-13053: Integer overflow in alarm_timer_nsleep.
The alarm_timer_nsleep function in the kernel timekeeping code does not
check for overflow when adding two time values together, potentially
causing undefined behavior in the kernel.
* CVE-2018-10880: Out-of-bounds access when making inode space in ext4 filesystem.
A logic error when making inode space in ext4 filesystem could lead to
an out-of-bounds access. A local attacker could use this flaw with a
crafted ext4 image to cause a denial-of-service.
* Kernel crash in OCFS2 Distributed Lock Manager lock resource initialization.
Incorrect locking when initializing an OCFS2 DLM lock resource could
result in memory corruption and a kernel crash.
* CVE-2018-14633: Permission bypass in SCSI authentication request process.
A logic error in SCSI authentication request process could lead to a
buffer overflow. A local attacker could use this flaw to expose SCSI
content without permission.
* Denial-of-service in hfsplus filesystem mount path.
Improper error handling in the hfsplus filesystem's mount path can lead to
a NULL pointer dereference, and subsequent kernel panic. A local attacker
could use this to cause a denial-of-service.
* Denial-of-service in hfsplus record insertion path.
Improper error handling the the hfsplus filesystem's record insertion path
can cause a return code to be stored in place of a pointer. This can lead
to a panic if the data is accessed elsewhere. This could be used to cause a
denial-of-service.
* Read of uninitialized memory in filesystem core.
An incorrect length check during a copy operation in the filesystem core can
lead to a read of uninitialized memory. This could cause unexpected behavior,
including potential denial-of-service.
* Race condition in IPVS core.
A logic error in the IPVS core code path that handles new connections creates
a race condition, which can lead to an infinite loop. This could be used to
cause a denial-of-service.
* Soft lockup in device-mapper core.
A failure to properly reschedule a process in the device-mapper core can result
in soft lockups. These could result in degraded system performance, or
denial-of-service.
* NULL pointer dereference during initialization of the HTB packet scheduling algorithm.
A logic error during initialization of the Hierarchical Token Buckets
(HTB) packet scheduling algorithm could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a
denial-of-service.
* Invalid memory access when initializing Hardware Multiqueue-aware Multi Band Queuing scheduler.
A logic error when initializing Hardware Multiqueue-aware Multi Band
Queuing scheduler could lead to an invalid memory access. A local
attacker could use this flaw to cause a denial-of-service.
* NULL pointer dereference during initialization of Heavy-Hitter Filter packet scheduling algorithm.
A logic error when initialization of Heavy-Hitter Filter packet
scheduling algorithm fails could lead to a NULL pointer dereference. A
local attacker could use this flaw to cause a denial-of-service.
* NULL pointer dereference when initializing network emulator.
A logic error when initializing network emulator fails could lead to a
NULL pointer dereference. A local attacker could use this flaw to cause
a denial-of-service.
* NULL pointer dereference on initialization failure of Token Bucket Filter packet scheduling algorithm.
A logic error on initialization failure of Token Bucket Filter packet
scheduling algorithm could lead to a NULL pointer dereference. A local
attacker could use this flaw to cause a denial-of-service.
* Out-of-bounds access when handling INQUIRY command with Realtek PCI-E Card Reader RTS5208/5288 driver.
A logic error when handling INQUIRY command with Realtek PCI-E Card
Reader RTS5208/5288 driver could lead to an invalid memory access. A
local attacker could use this flaw to cause a denial-of-service.
* Memory leak on initialization failure of Texas Instruments shared transport line discipline driver.
A missing free of resources when initialization of Texas Instruments
shared transport line discipline driver fails could lead to a memory
leak. A local attacker could use this flaw to cause a denial-of-service.
* Double free when initialization of Userspace I/O drivers fails.
A logic error when initialization of Userspace I/O drivers fails could
lead a double free and to a denial-of-service.
* Invalid memory access in OKI SEMICONDUCTOR ML7213 IOH GPIO driver.
A logic error in OKI SEMICONDUCTOR ML7213 IOH GPIO driver could lead to
an out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service.
* Out-of-bounds access when mounting a f2fs filesystem.
A missing check when mounting a f2fs filesystem could lead to an
out-of-bounds access. A local attacker could use a crafted f2fs
filesystem to cause a denial-of-service.
* Out-of-bounds access when copying data in Netfilter Xtables.
A logic error when copying data in Netfilter Xtables could lead to an
out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service.
* Improved fix for Spectre v1: Bounds-check bypass in Honeywell HMC6352 compass driver.
A missing use of the indirect call protection macro in Honeywell HMC6352
compass driver could lead to speculative execution. A local attacker
could use this flaw to leak information about the running system.
* Use-after-free when setting usb interface with xHCI USB Host.
A logic error when setting usb interface with xHCI USB Host could lead
to a use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Out-of-bounds access in completion handler of USB Inside Out Edgeport Serial driver.
A missing check in completion handler of USB Inside Out Edgeport Serial
driver could lead to an out-of-bounds access. A local user could use a
malicious USB device to cause a denial-of-service.
* Out-of-bounds access based on user input in Yurex USB driver.
A missing check on user input in Yurex USB driver could lead to an
out-of-bounds access. A local attacker could use this flaw to cause a
denial-of-service.
* Integer overflow when finding CIFS entries.
A missing check when finding CIFS entries could lead to an integer
overflow. A local attacker could use this flaw to cause a
denial-of-service.
* Use-after-free in system-call auditing driver.
A locking error when adding a watcher in system-call auditing driver
could lead to a use-after-free. A local attacker could use this flaw to
cause a denial-of-service.
* NULL pointer dereference when using KFD ioctls in HSA kernel driver for AMD GPU devices.
A wrong return code when using KFD ioctls in HSA kernel driver for AMD
GPU devices could lead to a NULL pointer dereference. A local attacker
could use this flaw to cause a denial-of-service.
* NULL pointer dereference when accessing TI BQ4802 RTC registers.
A wrong error-handling in TI BQ4802 RTC driver could lead to a NULL
pointer dereference when accessing RTC registers. A local attacker could
use this flaw to cause a denial-of-service.
* Out-of-bounds access in interrupt handler of USB TI 3410/5052 Serial driver.
A missing check in interrupt handler of USB TI 3410/5052 Serial driver
could lead to an out-of-bounds access. A local user could use a
malicious USB device to cause a denial-of-service.
* NULL pointer dereference when using Intel Management Engine Interface.
A logic error when using Intel Management Engine Interface could lead to
a NULL pointer dereference. A local attacker could use this flaw to
cause a denial-of-service.
* Out-of-bounds access when handling NFC SHDLC I-Frame commands.
A missing check when handling NFC SHDLC I-Frame commands could lead to
an out-of-bounds access. A local attacker could use a malicious NFC
device to cause a denial-of-service.
* Information leak in SNDRV_EMU10K1_IOCTL_INFO Alsa ioctl.
A missing zeroing of variable in SNDRV_EMU10K1_IOCTL_INFO Alsa ioctl
could lead to an information leak. A local attacker could use this flaw
to leak information about running kernel and cause a denial-of-service.
* Memory leak when sending HDMI commands in Alienware Special feature control.
A missing free of resources when sending HDMI commands in Alienware
Special feature control could lead to a memory leak. A local attacker
could use this flaw to exhaust kernel memory and cause a
denial-of-service.
* Information leak when using Performance Monitoring Counter in a Xen guest.
A missing initialization of on-stack data when using Performance
Monitoring Counter in a Xen guest could lead to an information leak. A
local attacker could use this flaw to leak information about running
kernel and facilitate an attack.
* Use-after-free when transmitting packets over IPV6.
A logic error when transmitting packets over IPV6 could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* Improved fix for Spectre v1: Bounds-check bypass in Virtual terminal driver.
A missing use of the indirect call protection macro in Virtual terminal
driver could lead to speculative execution. A local attacker could use
this flaw to leak information about the running system.
* Divide by zero error when deleting corrupted inline directories in ext4 filesystem.
A logic error when deleting corrupted inline directories in ext4
filesystem could lead to a divide by zero error. A local attacker could
use this flaw to cause a denial-of-service.
* Use-after-free when flushing queue pairs multiple times in Chelsio T4/T5 RDMA driver.
A missing check when flushing queue pairs multiple times in Chelsio
T4/T5 RDMA driver could lead to a use-after-free. A local attacker could
use this flaw to cause a denial-of-service.
* Invalid memory access when getting user queue pairs in VMware VMCI driver.
A logic error when getting user queue pairs in VMware VMCI driver could
lead to an invalid memory access. A local attacker could use this flaw
to cause a denial-of-service.
* Denial-of-service when handling packets over IPv6 over Low power Wireless Personal Area Network.
A logic error when handling packets over IPv6 over Low power Wireless
Personal Area Network could lead to a kernel assert. A local attacker
could use this flaw to cause a denial-of-service.
* Use-after-free when registering error detection and correction driver for Intel i7 processors.
Wrong error handling when registering error detection and correction
driver for Intel i7 processors could lead to a use-after-free. A local
attacker could use this flaw to cause a denial-of-service.
* Use-after-free when claiming USB interface.
A logic error in error path when claiming USB interface could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* NULL pointer dereference when configuring USB host.
A missing check when configuring USB host could lead to a NULL pointer
dereference. A local attacker could use this flaw to cause a
denial-of-service.
* NULL pointer dereference when setting ring parameters of e1000 network interface.
A logic error when setting ring parameters of e1000 network interface
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* Memory leak when setting ring parameters of e1000 network interface.
A missing free of resources when setting ring parameters of e1000
network interface could lead to a memory leak. A local attacker could
use this flaw to exhaust kernel memory and cause a denial-of-service.
* NULL pointer dereference when passing Fast Transition Information Element to the WLAN driver.
A missing check when passing Fast Transition Information Element to the
WLAN driver could lead to a NULL pointer dereference. A local attacker
could use this flaw to cause a denial-of-service.
* Memory corruption when registering Rocketport PCI serial device.
When registering a Rocketport PCI serial device, if the number of
connected PCI boards exceeds 8, the device info will be written
out-of-bounds, potentially resulting in memory corruption or a
denial-of-service.
* Information leak in /proc kernel stack dumps.
A failure to restrict accessing /proc/self/task/*/stack to only
root could allow an unprivileged user to get information about the
stack and its contents on another process.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-16.04-updates
mailing list