[Ksplice][CloudLinux 5 Updates] New updates available via Ksplice (2.6.18-508.el5.lve0.8.89)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Oct 31 10:48:15 PDT 2016
Synopsis: 2.6.18-508.el5.lve0.8.89 can now be patched using Ksplice
CVEs: CVE-2015-2925 CVE-2015-5364 CVE-2015-5366 CVE-2016-5195
Systems running CloudLinux 5 can now use Ksplice to patch against the
latest CloudLinux 5 kernel update, 2.6.18-508.el5.lve0.8.89.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on CloudLinux 5 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.
A race condition in the memory subsystem could allow write access to
otherwise read-only memory mappings. A local, unprivileged user could use
this flaw to escalate their privileges.
* CVE-2015-2925: Privilege escalation in bind mounts inside namespaces.
Incorrect handling of renames inside container bind mounts could allow a
local user to escape a container and escalate privileges under specific
conditions.
* Container escape in bind mounts.
Incorrect handling of disconnected paths could allow a user in a
container to escape from the container filesystem and access the host
filesystem.
* CVE-2015-5364, CVE-2015-5366: Kernel hang on UDP flood with wrong checksums.
A flaw in the UDP handling of wrong checksums could lead to a kernel hang
under a UDP flood attack. A remote attacker could use this flaw to cause a
denial-of-service.
* Denial-of-service in move_pages() system call.
Missing validation of the pid parameter to the move_pages() system call
could allow a malicious user to trigger a kernel panic, crashing the
system.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-CloudLinux5-Updates
mailing list