From ksplice-support_ww at oracle.com Tue Oct 3 11:07:10 2017 From: ksplice-support_ww at oracle.com (Oracle Ksplice) Date: Tue, 3 Oct 2017 18:07:10 GMT Subject: [Ksplice][Virtuozzo 4 Updates] New Ksplice updates for Virtuozzo 4 or OpenVZ on RHEL 5 (2.6.18-419.el5.028stab122.4) Message-ID: <201710031807.v93I7Axj025601@ksplice-billing.us.oracle.com> Synopsis: 2.6.18-419.el5.028stab122.4 can now be patched using Ksplice CVEs: CVE-2017-1000253 Systems running Virtuozzo 4 or the OpenVZ RHEL 5 kernel can now use Ksplice to patch against the latest Parallels Virtuozzo Containers kernel security update, 2.6.18-419.el5.028stab122.4. INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack running Virtuozzo 4 or OpenVZ on RHEL 5 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2017-1000253: Privilege escalation via stack overflow in PIE binaries. A flaw in the implementation of the ELF format loader for Position Independent Executables could allow a malicious user to overflow the stack. An SUID or similarly privileged binary exploited in this way could allow the user to escalate their privileges. Running processes may need to be restarted for the change to take effect. It is therefore recommended that long-running processes and network daemons are restarted after applying this update. SUPPORT Ksplice support is available at ksplice-support_ww at oracle.com.