[Ksplice][Virtuozzo 4.7 Updates] New Ksplice updates for Virtuozzo 4.7 or OpenVZ on RHEL 6 (2.6.32-042stab125.3)

Oracle Ksplice ksplice-support_ww at oracle.com
Wed Oct 4 00:49:04 PDT 2017


Synopsis: 2.6.32-042stab125.3 can now be patched using Ksplice
CVEs: CVE-2017-1000253

Systems running Virtuozzo 4.7 or the OpenVZ RHEL 6 kernel can now use
Ksplice to patch against the latest Parallels Virtuozzo Containers 4.7
kernel security update, 2.6.32-042stab125.3.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Virtuozzo 4.7
or OpenVZ on RHEL 6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-1000253: Privilege escalation via stack overflow in PIE binaries.

A flaw in the implementation of the ELF format loader for
Position Independent Executables could allow a malicious user to
overflow the stack. An SUID or similarly privileged binary exploited in
this way could allow the user to escalate their privileges.

Running processes may need to be restarted for the change to take
effect. It is therefore recommended that long-running processes and
network daemons are restarted after applying this update.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-VZ4.7-Updates mailing list