[Ksplice][Ubuntu-18.10-Updates] New Ksplice updates for Ubuntu 18.10 Cosmic (4.18.0-18.19)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Apr 25 06:26:39 PDT 2019


Synopsis: 4.18.0-18.19 can now be patched using Ksplice
CVEs: CVE-2017-5715

Systems running Ubuntu 18.10 Cosmic can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.18.0-18.19.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 18.10
Cosmic install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial-of-service in FSCache object lookup.

A race condition between looking up and dropping an object from an FSCache
instance can lead to a kernel hang. A local user could use this flaw to cause a
denial-of-service.


* Improved fix for CVE-2017-5715: Information leak due to missing IBPB calls in SVM.

A potential Spectre v2 attack vector exists in the KVM code that
supports SVM-enabled processors, due to a failure to call
indirect_branch_prediction_barrier when freeing vcpus.  This can be
exploited by a local attacker to leak information about the running
system.


* NULL pointer dereference in AMD IOMMU ACPI device matching.

A missing NULL pointer dereference could result in a kernel crash when
attempting to matching IDs for an ACPI device.


* Note: Ksplice will not add the STIBP support for CVE-2017-5715.

Ksplice will not add support for the Intel STIBP feature which provides
Spectre hardening for user-space processes.  Administrators wishing to
provide protection between user-space processes may disable
hyperthreading with:

  echo off > /sys/devices/system/cpu/smt/control

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Ubuntu-18.10-updates mailing list