[Ksplice][Debian 8.0 Updates] New updates available via Ksplice (DSA 3696-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Oct 21 08:03:42 PDT 2016
Synopsis: DSA 3696-1 can now be patched using Ksplice
CVEs: CVE-2015-8956 CVE-2016-0742 CVE-2016-3134 CVE-2016-5195 CVE-2016-7425
Systems running Debian 8.0 Jessie can now use Ksplice to patch against
the latest Debian kernel update, DSA 3696-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Debian 8.0 Jessie
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2016-0742: Stack corruption when reading keys from proc filesystem.
An on-stack buffer is not big enough to hold the data being written to it
when reading keys from the proc filesystem, potentially leading to a kernel
panic when the stack protector is in use. A local, unprivileged user could
use this flaw to cause a denial-of-service.
* CVE-2016-7425: Heap corruption in ARECA SATA/SAS RAID host adapter.
Lack of bounds checking when copying data from userspace could lead to heap
corruption. A local user with the ability to transfer messages to the
ARECA SATA/SAS RAID driver could use this flaw to gain kernel execution.
* CVE-2015-8956: NULL pointer dereference in the Bluetooth stack.
A missing NULL pointer check when binding to a bluetooth socket could cause
a NULL pointer dereference. A local user with privileges to bind a
bluetooth socket could use this flaw to cause a denial-of-service.
* Improved fix to CVE-2016-3134: Memory corruption when parsing netfilter source chains.
The original upstream fix caused netfilter ruleset loading to require
several minutes, potentially causing soft-lockups.
* CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.
A race condition in the memory subsystem could allow write access to
otherwise read-only memory mappings. A local, unprivileged user could use
this flaw to escalate their privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Debian-8.0-Updates
mailing list