[Ksplice][Ubuntu-17.04-Updates] New Ksplice updates for Ubuntu 17.04 Zesty (4.10.0-42.46)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Dec 8 17:18:16 PST 2017
Synopsis: 4.10.0-42.46 can now be patched using Ksplice
CVEs: CVE-2017-1000405 CVE-2017-12146 CVE-2017-16939
Systems running Ubuntu 17.04 Zesty can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.10.0-42.46.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 17.04
Zesty install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* NULL pointer dereference in ipv6 route additions and deletions.
A failure to properly register and unregister ipv6 routes could lead to
a NULL pointer dereference and kernel crash. An attacker could exploit
this to cause a denial-of-service.
* NULL pointer dereferences caused by B+trees manipulation in XFS filesystem.
Logic errors when manipulation B+trees in XFS driver could lead to NULL
pointer dereferences. A local attacker could use this flaw to cause a
denial-of-service.
* CVE-2017-12146: Privilege escalation using a sysfs entry from platform driver.
Incorrect locking when using 'driver_override' entry of platform driver
sysfs could lead to a race condition. A local attacker could use this
flaw to escalate privilege.
* CVE-2017-16939: Denial-of-service in IPSEC transform policy netlink dump.
A failure to handle an error case when dumping IPSEC transform
information via netlink can result in a Kernel crash. A local user with
the ability to administer an IPSEC tunnel could use this flaw to cause a
denial-of-service.
* CVE-2017-1000405: Privilege escalation when writing into a Transparent Huge Page.
A logic error in internal Transparent Huge Page handling of the kernel
could let an attacker overwrite read-only data and escalate privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-17.04-updates
mailing list