[Ksplice][Ubuntu-19.04-Updates] New Ksplice updates for Ubuntu 19.04 Disco (USN-4093-1)

Jamie Iles jamie.iles at oracle.com
Fri Aug 16 06:50:21 PDT 2019


Synopsis: USN-4093-1 can now be patched using Ksplice
CVEs: CVE-2019-10126 CVE-2019-1125 CVE-2019-12984 CVE-2019-13233 CVE-2019-13272 CVE-2019-3846 CVE-2019-5489

Systems running Ubuntu 19.04 Disco can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-4093-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 19.04
Disco install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2019-12984: NULL pointer dereference when deactivating target in NFC subsystem.

A missing check on user input when deactivating target in NFC subsystem
could lead to a NULL pointer dereference. A local attacker could use
this flaw to cause a denial-of-service.


* CVE-2019-3846: Heap overflow when parsing BSS descriptor in Marvell WiFi-Ex driver.

A missing check on user input when parsing BSS descriptor in Marvell
WiFi-Ex driver could let a local attacker cause a heap overflow and a
denial-of-service.


* CVE-2019-10126: Heap overflow when parsing IEs in Marvell WiFi-Ex driver.

A missing check when parsing IEs in Marvell WiFi-Ex driver could lead to
a heap overflow. A local attacker could use this flaw to cause a
denial-of-service.


* Privilege escalation when configuring VLAN hardware timestamp.

VLAN ioctl path for hardware timestamp configuration is missing a
privilege check. An otherwise unprivileged user who can make
SIOCSHWTSTAMP ioctl could exploit this vulnerability to escalate
privilege to root.


* CVE-2019-5489: Information leak in the mincore() syscall implementation.

Missing checks in the mincore() syscall could let a local attacker
observes page cache access patterns on other process in the system and
lead to an information leak.


* Denial-of-service during fallocate syscall on hugetlbfs file.

When punching hole in a file mapped through hugetlbfs using the
fallocate syscall, a concurrent page fault leads to a data race. A local
attacker could exploit this to cause a denial-of-service.


* Kernel crash in OCFS2 reading of deleted inodes.

A race condition when reading an inode that has been deleted could
result in a kernel crash under specific conditions.


* Denial-of-service when configuring keyboard.

A use-after-free bug in the keyboard configuration path for virtual
terminal causes a kernel crash. A malicious local user could exploit
this to cause a denial-of-service.


* Data-loss when resizing an ext4 partition.

A logic error during ext4 partition resize causes the inode table to get
into an indeterminate state. This could cause data corruption.


* Denial-of-service when configuring a bcache device.

When configuring a device as cache using the bcache filesystem,
registration and unregistration could race each other and cause a
kernel crash. A malicious local user could exploit this bug to cause a
denial-of-service.


* Data-loss in bcache filesystem journal operation.

A bug in the bcache filesystem causes a failure to write journal data to
disk under certain fault condition, e. g. the system crashing or losing
power abruptly. This could lead to inadvertent data-loss.


* CVE-2019-13272: Privilege escalation in ptrace implementation.

A logic error in the ptrace implementation core can allow a malicious
user process to gain unintended privileges, which could be further
abused to ptrace an suid binary and gain root privileges.


* CVE-2019-13233: Denial-of-service when configuring CIFS oplock level.

A data-race in CIFS oplock level configuration path leads to a buffer
overflow. An malicious user could exploit this to cause a
denial-of-service.


* CVE-2019-13233: Use-after-free when accessing LDT entry.

A locking error while accessing LDT entry could lead to a
use-after-free. A local attacker could use this flaw to cause a
denial-of-service.


* CVE-2019-1125: Information leak in kernel entry code when swapping GS.

A local attacker could speculatively access percpu data using a user
defined GS and leak information about running kernel to facilitate an
attack.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.



More information about the Ksplice-Ubuntu-19.04-updates mailing list