[El-errata] New Ksplice updates for UEKR4 4.1.12 on OL6 and OL7 (ELSA-2018-4011)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Tue Jan 16 09:24:10 PST 2018


Synopsis: ELSA-2018-4011 can now be patched using Ksplice
CVEs: CVE-2017-5715

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-4011.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR4 4.1.12 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-5715: Spectre bypass in Intel VMX KVM guest exit.

A logic error when handling a guest exit could fail to restrict
speculative execution, potentially allowing a malicious guest to leak
information from the host kernel.

Orabug: 27369994


* CVE-2017-5715: Spectre bypass in 32-bit system calls.

Incorrect setting of restricted speculation for 32-bit system calls
could allow a malicious 32-bit application to bypass Spectre
protections, leaking the contents of system memory.

Orabug: 27339995


* Use-after-free in ptrace access checks.

Incorrect RCU locking could result in a use-after-free when checking
permissions for ptrace related accesses.  A local, unprivileged user
could use this flaw to crash the system.

Orabug: 27339995


* Incorrect ibrs_enabled+ibpb_enabled reporting.

A logic error when returning the ibrs_enabled/ibpb_enabled sysctl values
could incorrectly report that the protections where enabled despite
being disabled on the kernel command line.

Orabug: 27363792

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.






More information about the El-errata mailing list