[El-errata] New glibc updates available via Ksplice (ELSA-2017-0680)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue Mar 28 10:14:37 PDT 2017
Synopsis: ELSA-2017-0680 can now be patched using Ksplice
CVEs: CVE-2014-9761 CVE-2015-8776 CVE-2015-8778 CVE-2015-8779
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-0680.
INSTALLING THE UPDATES
We recommend that all users of Ksplice on OL 6 install these updates.
You can install these updates by running:
# ksplice -y user upgrade
32-bit applications should be restarted after upgrading the on-disk
glibc RPMs and statically linked applications using
glibc should be rebuilt to include these fixes.
Ksplice user-space patching requires installation of Ksplice-aware
packages and the system must be rebooted after the first installation of
these packages. Refer to the installation instructions for the Enhanced
Ksplice Client in the Ksplice User's Guide for more details. Systems
may be prepared for Ksplice patching by installing the Ksplice aware
packages in advance, prior to installing the enhanced Ksplice client.
* CVE-2014-9761: Stack overflow in nan/nanl/nanf functions.
The nan/nanl/nanf functions allocated a variable length array on the
stack which could result in a stack buffer overflow. An attacker that
could supply malicious buffers to these functions could use this flaw to
trigger a denial of service, or potentially, execute code.
* CVE-2015-8776: Denial-of-service in strftime().
Missing sanitization of input data to the strftime() function could
result in out-of-bounds accesses leading to a crash, or potentially,
* CVE-2015-8778: Code execution in hcreate() and hcreate_r().
An integer overflow in hcreate() and hcreate_r() could result in an
out-of-bounds memory access. A malicious user could use this flaw to
trigger a denial of service, or potentially, gain code execution.
* CVE-2015-8779: Code execution in catopen().
An unbound stack allocation in the catopen() function could allow a
malicious user to cause an out of bounds memory access resulting in a
crash, or potentially, gain code execution.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata