[Ksplice][Ubuntu-16.04-Updates] New Ksplice updates for Ubuntu 16.04 Xenial (4.4.0-141.167)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Jan 21 02:27:46 PST 2019
Synopsis: 4.4.0-141.167 can now be patched using Ksplice
CVEs: CVE-2017-18174 CVE-2017-5753 CVE-2018-12896 CVE-2018-18690 CVE-2018-18710
Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.4.0-141.167.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 16.04
Xenial install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-18174: Double free in AMD GPIO removal.
A logic error in the amd_gpio code could lead to a double free,
potentially causing memory corruption or a kernel panic. This
could be exploited to cause a denial-of-service.
* CVE-2018-18690: Denial-of-service on XFS filesystem with attribute setting.
A failure to properly handle an error condition in the xfs code could
allow a local attacker with permissions to set attributes on an xfs
filesystem to make the filesystem non-operational without a remount
by exploiting an error condition with the ATTR_REPLACE operation.
* CVE-2018-18710: Information leak in CD-ROM status reporting.
A bounds check failure in the CD-ROM slot status reporting can lead to an
information leak. A local user with access to a CD-ROM device could use this
flaw to leak information about the running system.
* CVE-2018-12896: Denial-of-service via POSIX timer overflow.
The POSIX timer overrun value can potentially overflow an integer value
if the timer has a sufficiently long interval and expiry time. A
malicious user to create such a timer to cause a denial-of-service.
* Improved fix for CVE-2017-5753: Bounds-check bypass in ALSA drivers.
Various arrays in the ALSA sound driver code are potentially vulnerable
to a Spectre variant 1 speculative execution attack.
* Improved fix for CVE-2017-5753: Bounds-check bypass in USB virtual host controller driver.
A missing use of the indirect call protection macro in the USB virtual
host controller driver could lead to speculative execution. A local
attacker could use this flaw to leak information about the running
system.
* Improved fix for Spectre v1: Bounds-check bypass during AHCI LED control.
A missing use of the indirect call protection macro during AHCI LED
configuration could lead to speculative execution. A local attacker could use
this flaw to leak information about the running system.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-16.04-updates
mailing list