Cockpit and Ksplice Updates for Oracle Linux
Posted on: 03/13/2019 06:29 PM

The following updates has been released for Oracle Linux:

ELSA-2019-0482 Moderate: Oracle Linux 7 cockpit security update (aarch64)
New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2019-4576)

ELSA-2019-0482 Moderate: Oracle Linux 7 cockpit security update (aarch64)
Oracle Linux Security Advisory ELSA-2019-0482

http://linux.oracle.com/errata/ELSA-2019-0482.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

aarch64:
cockpit-173.2-1.0.1.el7.aarch64.rpm
cockpit-bridge-173.2-1.0.1.el7.aarch64.rpm
cockpit-system-173.2-1.0.1.el7.noarch.rpm
cockpit-ws-173.2-1.0.1.el7.aarch64.rpm
cockpit-doc-173.2-1.0.1.el7.aarch64.rpm
cockpit-machines-ovirt-173.2-1.0.1.el7.noarch.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/cockpit-173.2-1.0.1.el7.src.rpm



Description of changes:

[173.2-1.0.1]
- turn off display of subscriptions menu item in GUI
- Drop subscription-manager requirement since we do not ship it
(tianyue.lan@oralce.com)
- Remove Red Hat references.

[173.2-1]
- ws: Fix bug parsing invalid base64 headers rhbz#1672296




New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2019-4576)
Synopsis: ELSA-2019-4576 can now be patched using Ksplice
CVEs: CVE-2017-17807 CVE-2018-10876 CVE-2018-10878 CVE-2018-13053 CVE-2018-9568

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2019-4576.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR3 3.8.13 on
OL6 and OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2018-10878: Out-of-bounds access when initializing ext4 block bitmap.

A logic error when initializing ext4 block bitmap could lead to an
out-of-bounds access. A local attacker could use this flaw with a
crafted ext4 image to cause a denial-of-service.

Orabug: 29428608


* CVE-2018-9568: Privilege escalation in IPv6 to IPv4 socket cloning.

A logic error when transforming an IPv6 socket to an IPv4 socket can
result in releasing memory into the wrong cache. This flaw can result in
memory corruption and potential privilege escalation.

Orabug: 29422740


* CVE-2018-10876: Use-after-free when removing space in ext4 filesystem.

A logic error when removing space in ext4 filesystem could lead to a
use-after-free. A local attacker could use this flaw with a crafted ext4
image to cause a denial-of-service.

Orabug: 29409425


* CVE-2017-17807: Permissions bypass when requesting key on default keyring.

When calling request_key() with no keyring specified, the requested key
is generated and added to the keyring even if the user does not have
write permissions.

Orabug: 29304552


* CVE-2018-13053: Integer overflow in alarm_timer_nsleep.

The alarm_timer_nsleep function in the kernel timekeeping code does not
check for overflow when adding two time values together, potentially
causing undefined behavior in the kernel.

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.






Printed from Linux Compatible (https://www.linuxcompatible.org/news/story/cockpit_and_ksplice_updates_for_oracle_linux.html)