[Ksplice-cloudlinux6-updates] New Ksplice updates for CloudLinux 6 (2.6.32-896.16.1.lve1.4.54.el6)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Jun 1 05:55:23 PDT 2018


Synopsis: 2.6.32-896.16.1.lve1.4.54.el6 can now be patched using Ksplice
CVEs: CVE-2016-9604 CVE-2017-15274 CVE-2017-7472

Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-896.16.1.lve1.4.54.el6.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running CloudLinux 6
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-15274: Denial-of-service in kernel keyring add_key() syscall.

A NULL pointer dereference could allow a local, unprivileged user to
cause a denial of service by updating a key with a NULL payload an
non-zero length.


* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.

A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.


* CVE-2017-7472: Denial-of-service when setting default request-key keyring.

A logic error when a user set default request-key keyring multiple
times could lead to a memory leak. A local attacker could use this flaw
to exhaust kernel memory and cause a kernel panic.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-CloudLinux6-Updates mailing list