[Ksplice-cloudlinux6-updates] New updates available via Ksplice (2.6.32-673.8.1.lve1.4.3.el6)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Feb 22 07:51:23 PST 2016
Synopsis: 2.6.32-673.8.1.lve1.4.3.el6 can now be patched using Ksplice
CVEs: CVE-2015-6937 CVE-2015-7613 CVE-2015-7872
Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-673.8.1.lve1.4.3.el6.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on CloudLinux 6 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Container escape in bind mounts.
Incorrect handling of disconnected paths could allow a user in a
container to escape from the container filesystem and access the host
filesystem.
* CVE-2015-6937: NULL pointer dereference in RDS socket creation.
Failure to check for binding to a transport could result in a NULL
pointer dereference when creating an RDS socket. A local, unprivileged
user could use this flaw to crash the system.
* CVE-2015-7872: Denial-of-service when garbage collecting uninstantiated keyring.
A logic error in the security keyring subsystem leads to a kernel crash
when garbage collecting a un-instantiated keyring. A local, un-privileged
user can use this flaw to cause a denial-of-service.
* CVE-2015-7613: Privilege escalation in IPC object initialization.
Incorrect initialization of IPC objects could result in memory
corruption when creating message queues or shared memory. A local,
unprivileged user could use this flaw to escalate privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-CloudLinux6-Updates
mailing list