[El-errata] New updates available via Ksplice (ELBA-2015-3076)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Fri Aug 28 08:22:40 PDT 2015


Synopsis: ELBA-2015-3076 can now be patched using Ksplice
CVEs: CVE-2012-3520

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle kernel update, ELBA-2015-3076.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on EL 5 install these
updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Kernel panic in OCFS2 during lock migration.

Due to a logic error and data race during lock migration in the OCFS2
filesystem, it is possible in rare circumstances for the kernel to
dereference invalid data which will trigger a subsequent assertion
failure.


* NFS hang on OCFS2 cluster during unlock race.

A race condition in the OCFS2 and DLM interaction could result in NFS
accesses hanging under rare conditions.


* Use-after-free in shmctl(IPC_RMID) call.

A use-after-free when performing the shmctl(IPC_RMID) during other
shared memory IPC operations could result in a kernel crash, triggerable
by a local, privileged user.


* Incorrect permissions in XFS subdirectories with SGID bit set and ACL's.

New files and directories in a subdirectory with an access control list
and the SGID bit set would not have the group correctly inherited.


* Kernel crash in Infiniband RDS packet reception.

Receiving incorrectly addressed RDS packets over an Infiniband
connection could result in a kernel crash and denial-of-service.  A
remote user that could send RDS packets to the host could trigger a
denial-of-service.


* Soft lockup in JBD2 journal locking.

Under specific conditions, a filesystem using the JBD2 journal could get
stuck in an uninterruptible sleep waiting for the journal to lock.


* CVE-2012-3520: privilege escalation in netlink socket credential passing.

Under certain circumstances the kernel could pass zeroed credentials to
userspace causing the application to mistakenly see credentials for the
superuser resulting in a possible privilege escalation.


* Use-after-free in NVMe device disabling.

A race condition in NVMe device disabling could result in accessing an
unmapped address on queue completion and crashing the kernel.


* Out-of-bounds memory access in IP over Infiniband protocol validation.

A logic error in the IP over Infiniband driver protocol version
validation could result in false positives and accessing beyond the end
of a structure, causing a kernel crash.


* Denial-of-service in Reliable Datagram Socket transmission.

Sending a large number of datagrams over an RDS socket could result in
exceeding the send buffer and blocking the device.  A local,
unprivileged user could use this flaw to trigger a denial-of-service
attack.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list