[El-errata] New updates available via Ksplice (ELSA-2015-3053)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Jul 29 15:13:42 PDT 2015

Synopsis: ELSA-2015-3053 can now be patched using Ksplice
CVEs: CVE-2014-9683 CVE-2015-0239 CVE-2015-3339

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Security Advisory, ELSA-2015-3053.


We recommend that all users of Ksplice Uptrack on EL 6 install these

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


* CVE-2014-9683: Out-of-bounds memory write in eCryptfs when decoding a file name.

A lack of input validation when decoding a file name in the eCryptfs driver
could lead to an out-of-bounds memory write of one zero byte, potentially
causing a kernel panic.  A local user could use a specially crafted
eCryptfs filesystem to cause a denial-of-service.

* CVE-2015-3339: Privilege escalation due to race condition between execve and chown.

The execve() syscall can race with inode attribute changes made by chown().
This race condition could result in execve() setting uid/gid to the new
owner, leading to privilege escalation.

* CVE-2015-0239: Privilege escalation in KVM sysenter emulation.

The KVM emulation of the sysenter instruction does not validate 16-bit
code segments which can allow a local attacker to potentially elevate


Ksplice support is available at ksplice-support_ww at oracle.com.

More information about the El-errata mailing list