[El-errata] New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2017-3597)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Fri Jul 28 08:26:53 PDT 2017


Synopsis: ELSA-2017-3597 can now be patched using Ksplice
CVEs: CVE-2014-9710 CVE-2015-1465 CVE-2015-2686 CVE-2015-4167 CVE-2017-7273

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3597.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2015-2686: Privilege escalation in sendto() and recvfrom() syscalls.

Lack of input validation in the sendto() and recvfrom() syscalls allows
user-space to overwrites kernel memory.  A local, unprivileged user could
use this flaw to escalate their privileges.


* CVE-2015-4167: Memory corruption when mounting malformed UDF disk images.

The kernel UDF filesystem driver, used by some CD-ROMs and DVDs, does
not validate overly long extended attributes which can trigger kernel
memory corruption and a kernel panic.


* CVE-2017-7273: Denial-of-service in Crypress USB HID driver.

A missing check in Crypress USB HID driver when parsing usb descriptors
could lead to an out of bounds access. An attacker with physical access
to the machine could use this flaw to cause a denial-of-service.


* CVE-2015-1465: Denial of service in IPv4 packet forwarding.

A remote user can trigger a denial-of-service by sending a large number
of packets needing redirection which triggers high CPU load.


* CVE-2014-9710: Privilege escalation in Btrfs when replacing extended attributes.

Incorrect locking in Btrfs when replacing file extended attributes leads to
a race condition in which the ACL settings are inconsistent with the
requested replacement.  A local, unprivileged user could use this flaw to
bypass intended ACL and potentially elevate privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list