[Ksplice-Fedora-22-updates] New updates available via Ksplice (FEDORA-2016-2363b37a98)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Jun 2 06:16:31 PDT 2016
Synopsis: FEDORA-2016-2363b37a98 can now be patched using Ksplice
CVEs: CVE-2016-2117 CVE-2016-3713 CVE-2016-4580 CVE-2016-4913 CVE-2016-4951
The recently released Fedora 22, FEDORA-2016-2363b37a98, does not fix
any security problems relevant to already running systems. You do not
need to take any action to update your systems.
DESCRIPTION
* Information leak in mclist netlink attribute.
The netlink interface for querying the mclist attribute does not
initialize memory which leaks the contents of kernel memory to
userspace. A local user could use this flaw to infer the layout of
kernel memory.
* CVE-2016-2117: Information leak in Atheros ATL2 transmission.
The Atheros ATL2 driver advertised features that weren't supported by
the hardware and this could result in a buffer overflow, leaking the
contents of kernel memory into transmitted packets.
* Data corruption in openvswitch ipv6 checksum recalculation.
Incorrect flag check prior to recalculating ipv6 checksums in
openvswitch may result in the recalculation being skipped.
* CVE-2016-3713: Privilege escalation in KVM MTRR emulation.
Incorrect validation of emulated MTRR MSRs can allow a guest VM to read
and write memory in the KVM host. This may allow a privileged guest to
gain code execution in the KVM host.
* NULL pointer dereference in DECnet routing.
Missing NULL pointer checks could result in a NULL pointer dereference
and kernel crash when outputting a DECnet packet. A local, unprivileged
user could use this flaw to crash the system.
* NULL pointer dereference in Berkeley Packet Filter performance counters.
Incorrect validation of a BPF program could allow an unprivileged, local
user to trigger a NULL pointer dereference and kernel crash under
specific conditions.
* Use-after-free in network bridge ioctl().
Missing locking in the bridge ioctl handler for receiving network
interface indices could result in a use-after-free and kernel crash
under specific conditions.
* CVE-2016-4580: Kernel stack information leak in X25 facility negotiation.
Missing initialization of a stack data structure could result in leaking
up to 8 bytes of kernel stack information to a local, unprivileged user.
* Denial-of-service in compressed memory allocator scanning.
An integer overflow in compactable page calculation for the compressed
memory allocator could result in excessive compaction, and heavy
resource utilization.
* CVE-2016-4913: Information leak in ISO9660 filename parsing.
Incorrect handling of NUL termination bytes could result in reading
excessive data from a kernel buffer into user-space. A local user with
permissions to mount a maliciously crafted filesystem could use this
flaw to leak the contents of sensitive memory.
* Denial-of-service in Video4Linux buffer dequeuing.
A NULL pointer dereference in the buffer dequeuing logic for DVB devices
could result in a kernel crash, triggerable by a local user with access
to a DVB device.
* CVE-2016-4951: NULL pointer dereference in TIPC nested attribute parsing.
A missing NULL pointer check could result in a NULL pointer dereference
when parsing nested attributes for a published socket.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-22-Updates
mailing list