[Ksplice-cloudlinux6-updates] New Ksplice updates for CloudLinux 6 (2.6.32-954.3.5.lve1.4.59.el6)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Dec 13 14:47:24 PST 2018
Synopsis: 2.6.32-954.3.5.lve1.4.59.el6 can now be patched using Ksplice
CVEs: CVE-2016-1583 CVE-2016-8633 CVE-2017-1000365 CVE-2018-14634
Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-954.3.5.lve1.4.59.el6.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running CloudLinux 6
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2016-8633: Buffer overflow in firewire net driver.
A logic error on incoming packets checks could lead to a rx buffer
overflow. A remote attacker could use this flaw to cause a
denial-of-service.
* CVE-2018-14634: Privilege escalation in ELF executables.
An integer overflow in the argument setup for a new ELF executable could
result in attacker controlled corruption of the user stack when
executing a SUID binary. A local, unprivileged user could use this flaw
to gain superuser privileges.
* CVE-2017-1000365: Privilege escalation when performing exec.
A logic error allows an unprivileged local user to bypass argument and
environmental string size limits when performing an exec syscall. A
local user could use this flaw to bypass guard pages between the stack
and another mapping, leading to potential privilege escalation.
* Improved fix for CVE-2016-1583: Privilege escalation in eCryptfs.
Mounting eCryptfs over procfs could result in a stack overflow with deep
nesting allowing a local, unprivileged user to cause a
denial-of-service, or potentially escalate privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-CloudLinux6-Updates
mailing list