[Ksplice-cloudlinux6-updates] New Ksplice updates for CloudLinux 6 (2.6.32-896.16.1.lve1.4.54.el6)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Jun 1 05:55:23 PDT 2018
Synopsis: 2.6.32-896.16.1.lve1.4.54.el6 can now be patched using Ksplice
CVEs: CVE-2016-9604 CVE-2017-15274 CVE-2017-7472
Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-896.16.1.lve1.4.54.el6.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running CloudLinux 6
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-15274: Denial-of-service in kernel keyring add_key() syscall.
A NULL pointer dereference could allow a local, unprivileged user to
cause a denial of service by updating a key with a NULL payload an
non-zero length.
* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.
A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.
* CVE-2017-7472: Denial-of-service when setting default request-key keyring.
A logic error when a user set default request-key keyring multiple
times could lead to a memory leak. A local attacker could use this flaw
to exhaust kernel memory and cause a kernel panic.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-CloudLinux6-Updates
mailing list