New Ksplice updates has been released for RHEL 8.
Synopsis: ELSA-2019-3832 can now be patched using Ksplice
CVEs: CVE-2018-12207 CVE-2019-0154 CVE-2019-0155 CVE-2019-11135
Systems running Red Hat Enterprise Linux 8 can now use Ksplice to
patch against the latest Red Hat kernel update, ELSA-2019-3832.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2019-3832.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running RHEL 8 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Ksplice helpers to access cpuids.
* CVE-2018-12207: Machine Check Exception on page size change.
A hardware bug in Intel x86 processors can result in a Machine Check Exception
when a page table mapping for currently executing instructions is changed. A
privileged user in a guest VM could use this flaw to crash the host, leading to
a denial-of-service.
* CVE-2019-11135: Side-channel information leak in Intel TSX.
A side-channel information leak on some generations of Intel processors
could allow the leaking of internal microarchitectural buffers during
asynchronous aborts in a TSX transaction. For CPUs that are vulnerable
to Microarchitectural Data Sampling, existing mitigations cover
CVE-2019-11135, for newer CPUs with hardware fixes for MDS, TSX is
transparently disabled. On these newer CPUs, TSX functionality can be
restored by writing 0 to /sys/kernel/debug/x86/tsx_force_abort.
* CVE-2019-0155: Privilege escalation in Intel i915 graphics driver.
Missing validation of MMIO commands to the Intel i915 device driver could
result in illicit page table modifications. An attacker could use this to
access sensitive information or elevate privileges.
* CVE-2019-0154: Denial-of-service in Intel i915 graphics driver.
Due to a hardware error, the Intel i915 device state could get corrupted.
A malicious user could use this to cause denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.