[Ksplice][Ubuntu-19.04-Updates] New Ksplice updates for Ubuntu 19.04 Disco (USN-4093-1)
Jamie Iles
jamie.iles at oracle.com
Fri Aug 16 06:50:21 PDT 2019
Synopsis: USN-4093-1 can now be patched using Ksplice
CVEs: CVE-2019-10126 CVE-2019-1125 CVE-2019-12984 CVE-2019-13233 CVE-2019-13272 CVE-2019-3846 CVE-2019-5489
Systems running Ubuntu 19.04 Disco can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-4093-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 19.04
Disco install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2019-12984: NULL pointer dereference when deactivating target in NFC subsystem.
A missing check on user input when deactivating target in NFC subsystem
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.
* CVE-2019-3846: Heap overflow when parsing BSS descriptor in Marvell WiFi-Ex driver.
A missing check on user input when parsing BSS descriptor in Marvell
WiFi-Ex driver could let a local attacker cause a heap overflow and a
denial-of-service.
* CVE-2019-10126: Heap overflow when parsing IEs in Marvell WiFi-Ex driver.
A missing check when parsing IEs in Marvell WiFi-Ex driver could lead to
a heap overflow. A local attacker could use this flaw to cause a
denial-of-service.
* Privilege escalation when configuring VLAN hardware timestamp.
VLAN ioctl path for hardware timestamp configuration is missing a
privilege check. An otherwise unprivileged user who can make
SIOCSHWTSTAMP ioctl could exploit this vulnerability to escalate
privilege to root.
* CVE-2019-5489: Information leak in the mincore() syscall implementation.
Missing checks in the mincore() syscall could let a local attacker
observes page cache access patterns on other process in the system and
lead to an information leak.
* Denial-of-service during fallocate syscall on hugetlbfs file.
When punching hole in a file mapped through hugetlbfs using the
fallocate syscall, a concurrent page fault leads to a data race. A local
attacker could exploit this to cause a denial-of-service.
* Kernel crash in OCFS2 reading of deleted inodes.
A race condition when reading an inode that has been deleted could
result in a kernel crash under specific conditions.
* Denial-of-service when configuring keyboard.
A use-after-free bug in the keyboard configuration path for virtual
terminal causes a kernel crash. A malicious local user could exploit
this to cause a denial-of-service.
* Data-loss when resizing an ext4 partition.
A logic error during ext4 partition resize causes the inode table to get
into an indeterminate state. This could cause data corruption.
* Denial-of-service when configuring a bcache device.
When configuring a device as cache using the bcache filesystem,
registration and unregistration could race each other and cause a
kernel crash. A malicious local user could exploit this bug to cause a
denial-of-service.
* Data-loss in bcache filesystem journal operation.
A bug in the bcache filesystem causes a failure to write journal data to
disk under certain fault condition, e. g. the system crashing or losing
power abruptly. This could lead to inadvertent data-loss.
* CVE-2019-13272: Privilege escalation in ptrace implementation.
A logic error in the ptrace implementation core can allow a malicious
user process to gain unintended privileges, which could be further
abused to ptrace an suid binary and gain root privileges.
* CVE-2019-13233: Denial-of-service when configuring CIFS oplock level.
A data-race in CIFS oplock level configuration path leads to a buffer
overflow. An malicious user could exploit this to cause a
denial-of-service.
* CVE-2019-13233: Use-after-free when accessing LDT entry.
A locking error while accessing LDT entry could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2019-1125: Information leak in kernel entry code when swapping GS.
A local attacker could speculatively access percpu data using a user
defined GS and leak information about running kernel to facilitate an
attack.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-19.04-updates
mailing list