[El-errata] New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2017-3621)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Sep 21 09:49:56 PDT 2017
Synopsis: ELSA-2017-3621 can now be patched using Ksplice
CVEs: CVE-2017-1000251 CVE-2017-1000365 CVE-2017-12134
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3621.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR3 3.8.13 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2017-1000365: Privilege escalation when performing exec.
A logic error allows an unprivileged local user to bypass argument and
environmental string size limits when performing an exec syscall. A
local user could use this flaw to bypass guard pages between the stack
and another mapping, leading to potential privilege escalation.
* CVE-2017-12134, XSA-229: Privilege escalation in Xen block IO requests.
Incorrect merging of block IO vectors could result in corruption of data
accesses to/from a block device. A malicious guest could use this flaw
to crash the host, or potentially, gain privileges in the host.
* CVE-2017-1000251: Stack overflow in Bluetooth L2CAP config buffer.
Incorrectly parsing a Bluetooth L2CAP configuration buffer could allow
it to overwrite data on the stack, potentially allowing a remote
attacker to execute arbitrary code in the kernel.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata