[El-errata] New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2017-2679)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Sep 21 09:49:48 PDT 2017
Synopsis: ELSA-2017-2679 can now be patched using Ksplice
CVEs: CVE-2017-1000251 CVE-2017-1000365 CVE-2017-12134
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-2679.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-1000365: Privilege escalation when performing exec.
A logic error allows an unprivileged local user to bypass argument and
environmental string size limits when performing an exec syscall. A
local user could use this flaw to bypass guard pages between the stack
and another mapping, leading to potential privilege escalation.
* CVE-2017-12134, XSA-229: Privilege escalation in Xen block IO requests.
Incorrect merging of block IO vectors could result in corruption of data
accesses to/from a block device. A malicious guest could use this flaw
to crash the host, or potentially, gain privileges in the host.
* CVE-2017-1000251: Stack overflow in Bluetooth L2CAP config buffer.
Incorrectly parsing a Bluetooth L2CAP configuration buffer could allow
it to overwrite data on the stack, potentially allowing a remote
attacker to execute arbitrary code in the kernel.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list