[Ksplice][Ubuntu-16.04-Updates] New Ksplice updates for Ubuntu 16.04 Xenial (4.4.0-140.166)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Jan 17 11:28:33 PST 2019
Synopsis: 4.4.0-140.166 can now be patched using Ksplice
CVEs: CVE-2018-10879
Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.4.0-140.166.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 16.04
Xenial install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* NULL pointer dereference in IP transform.
A failure to handle an error case in the IP transform subsystem can
result in a NULL pointer dereference leading to a kernel crash.
* CVE-2018-10879: Use-after-free when setting extended attribute entry on ext4 filesystem.
A logic error when setting extended attribute entry on ext4 filesystem
could lead to a use-after-free. A local attacker could use this flaw
with a crafted ext4 filesystem to cause a denial-of-service.
* NULL pointer dereference during Elastic Network Adapter bringup.
A race condition during the initialization of the ENA network driver can
result in a kernel crash.
* Information disclosure via bind mount manipulation.
A logic error when checking mount permissions can result in a namespaced
process being able to view filesystem content outside of its namespace.
A local user could use this flaw to view restricted information.
* Kernel crash during device mapper cache resize operation.
A failure to reload dm-cache information during a resize operation can
result in a kernel crash.
* Deadlock in CPU hotplug cgroup migration.
A logic error can result in a terminating process causing a deadlock if
it is migrated between cpuset cgroups whilst it is being terminated.
* Use-after-free in ath10k command tracing.
A race condition in the ath10k driver can result in a tracepoint handler
accessing memory which has already been freed.
* Use-after-free during RMDA Userspace Connection Manager close.
A race condition between closing a userspace RDMA connection and an IP
resolution call can result in a use-after-free. A local user with access
to RDMA could use this flaw to cause a kernel crash or potentially
escalate privileges.
* NULL pointer dereference during UBIFS mount.
A missing NULL pointer check when reading the device name in a UBIFS
filesystem can result in a NULL pointer dereference, leading to a kernel
crash.
* Kernel crash during ath10k scan operation.
A logic error when calculating the size of a scan message in the ath10k
driver can result in an out-of-bounds write, leading to memory
corruption and a kernel crash.
* Kernel crash in ebtables target validation.
A failure to validate information from userspace can result in an
out-of-bounds memory access leading to a kernel crash.
* Kernel crash during HD audio device initialisation.
A race condition during initialisation of an HD audio device can result
in an interrupt being delivered before the driver is ready to receive
it, leading to a kernel crash.
* Kernel crash in ACPI i2c transaction execution.
A failure to correctly set the length of an i2c transaction can result
in the kernel reading an invalid value, leading to a kernel crash.
* Denial-of-service in JFFS2 extended attribute read.
A validation failure when reading extended attributes from a JFFS2
filesystem can result it an out-of-bounds memory write, leading to a
kernel crash. A local user with the ability to mount a crafted
filesystem could use this flaw to cause a denial-of-service.
* Denial-of-service in IPv4 and IPv4 tunnel packet transmission.
An incorrect assumption in the IPv4 and IPv6 tunnel implementations can
result in attempting to access uninitialized memory, leading to undefined
behavior. A local user with access to an IP tunnel could use this flaw
to cause a denial of service.
* Use-after-free in IP ancillary message reception.
Reading a stale IP header value in the ancillary message path can result
in a use-after-free.
* Denial-of-service in netlink IPv4 netlabel management.
An incorrect assumption about the format of a netlink netlabel request
can result in a NULL pointer dereference, leading to a kernel crash. A
local user with the ability to configure netlabels could use this flaw
to cause a kernel crash.
* Out-of-bounds write in AF9035 DVB tuner i2c implementation.
A logic error when transferring a small number of bytes via an i2c
interface to an AF9035 DVB tuner can result in an integer underflow,
leading to an out-of-bounds memory write. A local user with access to an
AF9035 DVB tuner could use this flaw to cause a denial-of-service.
* Kernel crash during USB serial gadget TTY close.
A race condition when closing a TTY session for a USB serial device
gadget can result in a NULL pointer dereference, leading to a kernel
crash.
* Kernel crash during Elastic Network Appliance removal.
A logic error when freeing an ENA instance can result in accessing an
invalid pointer, leading to a kernel crash.
* Kernel crash during SMSC75xx unbinding.
A failure to cancel delayed work in the SMSC75xx USB network driver can result
in a NULL pointer dereference after the driver has been unbound.
* Deadlock during enslave of network interface to team device.
Attaching the same network interface to a team device can result in a double
lock, leading to a deadlock. A local user with the ability to configure network
interfaces could use this flaw to cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-16.04-updates
mailing list