[Ksplice-Fedora-22-updates] New updates available via Ksplice (FEDORA-2016-2363b37a98)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Jun 2 06:16:31 PDT 2016


Synopsis: FEDORA-2016-2363b37a98 can now be patched using Ksplice
CVEs: CVE-2016-2117 CVE-2016-3713 CVE-2016-4580 CVE-2016-4913 CVE-2016-4951

The recently released Fedora 22, FEDORA-2016-2363b37a98, does not fix
any security problems relevant to already running systems. You do not
need to take any action to update your systems.


DESCRIPTION

* Information leak in mclist netlink attribute.

The netlink interface for querying the mclist attribute does not
initialize memory which leaks the contents of kernel memory to
userspace. A local user could use this flaw to infer the layout of
kernel memory.


* CVE-2016-2117: Information leak in Atheros ATL2 transmission.

The Atheros ATL2 driver advertised features that weren't supported by
the hardware and this could result in a buffer overflow, leaking the
contents of kernel memory into transmitted packets.


* Data corruption in openvswitch ipv6 checksum recalculation.

Incorrect flag check prior to recalculating ipv6 checksums in
openvswitch may result in the recalculation being skipped.


* CVE-2016-3713: Privilege escalation in KVM MTRR emulation.

Incorrect validation of emulated MTRR MSRs can allow a guest VM to read
and write memory in the KVM host. This may allow a privileged guest to
gain code execution in the KVM host.


* NULL pointer dereference in DECnet routing.

Missing NULL pointer checks could result in a NULL pointer dereference
and kernel crash when outputting a DECnet packet.  A local, unprivileged
user could use this flaw to crash the system.


* NULL pointer dereference in Berkeley Packet Filter performance counters.

Incorrect validation of a BPF program could allow an unprivileged, local
user to trigger a NULL pointer dereference and kernel crash under
specific conditions.


* Use-after-free in network bridge ioctl().

Missing locking in the bridge ioctl handler for receiving network
interface indices could result in a use-after-free and kernel crash
under specific conditions.


* CVE-2016-4580: Kernel stack information leak in X25 facility negotiation.

Missing initialization of a stack data structure could result in leaking
up to 8 bytes of kernel stack information to a local, unprivileged user.


* Denial-of-service in compressed memory allocator scanning.

An integer overflow in compactable page calculation for the compressed
memory allocator could result in excessive compaction, and heavy
resource utilization.


* CVE-2016-4913: Information leak in ISO9660 filename parsing.

Incorrect handling of NUL termination bytes could result in reading
excessive data from a kernel buffer into user-space.  A local user with
permissions to mount a maliciously crafted filesystem could use this
flaw to leak the contents of sensitive memory.


* Denial-of-service in Video4Linux buffer dequeuing.

A NULL pointer dereference in the buffer dequeuing logic for DVB devices
could result in a kernel crash, triggerable by a local user with access
to a DVB device.


* CVE-2016-4951: NULL pointer dereference in TIPC nested attribute parsing.

A missing NULL pointer check could result in a NULL pointer dereference
when parsing nested attributes for a published socket.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Fedora-22-Updates mailing list