[El-errata] New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2017-3566)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Sun May 21 02:15:07 PDT 2017
Synopsis: ELSA-2017-3566 can now be patched using Ksplice
CVEs: CVE-2015-5257 CVE-2015-6252 CVE-2015-9731 CVE-2016-10208 CVE-2016-10229 CVE-2016-2782 CVE-2017-2647 CVE-2017-5669 CVE-2017-5986 CVE-2017-6214 CVE-2017-7184 CVE-2017-7895
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3566.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR3 3.8.13 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-7895: Remote information leak in kernel NFS server.
Missing bounds checks could result in an out-of-bounds memory access,
allowing a remote attacker to leak the contents of kernel memory.
* CVE-2016-10229: Remote code execution when receiving UDP packet with short buffers.
Incorrect handling of checksums for short receive buffers could result in
applications failing to receive data from a UDP socket. A remote attacker
could use this flaw to execute arbitrary code.
* CVE-2015-5257: Denial-of-service in Whiteheat device probing.
Missing validation of USB endpoints could result in a NULL pointer
dereference when probing a Whiteheat USB device. An attacker with a
malicious USB device and physical access to the system could use this
flaw to crash the system.
* CVE-2017-7184: Privilege escalation when using xfrm IP framework.
A missing check when using xfrm IP framework could lead to an out of
bound access. A local attacker could use this flaw to cause a denial of
service or to escalate privilege.
* CVE-2015-6252: Denial-of-service in Virtio networking accelerator.
Missing resource tracking could result in a memory leak when performing
the VHOST_SET_LOG_FD ioctl. A local, privileged user with access to the
/dev/vhost-net device could use this flaw to trigger a
denial-of-service.
* CVE-2017-5669: Privilege bypass when using shmat() syscall to map page zero.
A logic error when mapping a page using shmat() syscall could allow a
user to map page zero and consequently bypass a protection mechanism
that exists for the mmap() system call.
* CVE-2016-2782: Crash in USB serial driver when malicious Treo device is connected.
Improper handling of USB endpoint probing during Treo device initialization
leads to a NULL pointer dereference.
* CVE-2017-6214: Denial-of-service when splicing from TCP socket.
A specially crafted packet can be queued to trigger an infinite loop in
IPv4 subsystem. This can be exploited by an remote attacker to cause
denial-of-service.
* CVE-2017-5986: Denial-of-service when using SCTP socket with concurrent thread.
A BUG_ON() could be triggered when queueing data in a full SCTP socket
while another thread disassociates the first thread from the socket. A
local attacker could use this flaw to cause a denial-of-service.
* CVE-2016-10208: Denial-of-service when mounting ext4 image with large metablock group.
A missing check when mounting an ext4 image with a high first metablock
group value could lead to a buffer overflow. A local attacker with mount
capability could use this flaw to cause a denial-of-service.
* Denial-of-service in xen-netfront out-of-memory handling.
A flaw in the retry logic of the xen-netfront driver in a low memory
situation can result in stalling the Rx path of the driver.
* CVE-2015-9731: Multiple out-of-bounds memory accesses in UDF filesystem driver.
A lack of input validation in the UDF filesystem driver leads to multiple
out-of-bounds memory accesses and potentially to a kernel panic. An
attacker could use a specially crafted filesystem to cause a
denial-of-service.
* CVE-2017-2647: Denial-of-service when invoking request_key() syscall.
A missing check in request_key() syscall could lead to a NULL pointer
dereference. A local unprivileged user could use this flaw to cause a
denial-of-service.
* Use-after-free in infiniband Fast Memory Registration management.
A race condition due to incorrect locking in the infiniband FMR pool
management can result in a use-after-free. This could result in a kernel
crash.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list