[Ksplice][CloudLinux 5 Updates] New Ksplice updates for CloudLinux 5 (2.6.18-519.el5.lve0.8.91)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Feb 28 07:26:57 PST 2017


Synopsis: 2.6.18-519.el5.lve0.8.91 can now be patched using Ksplice
CVEs: CVE-2013-2596 CVE-2016-1583 CVE-2016-5195 CVE-2017-2634 CVE-2017-6074

Systems running CloudLinux 5 can now use Ksplice to patch against the
latest CloudLinux 5 kernel update, 2.6.18-519.el5.lve0.8.91.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running CloudLinux 5
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option.

A logic error when using IPV6_RECVPKTINFO socket option could lead to a
use-after-free. A local user could use this flaw to cause a
denial-of-service.


* CVE-2013-2596: Privilege escalation in video frame buffer driver.

Integer overflow in the fb_mmap() function allows local users to create a
read-write memory mapping for the entirety of kernel memory, and
consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system
calls.


* Kernel crash in inode instantiation.

Incorrect error handling when instantiating an inode could under
specific conditions result in releasing an already released lock and
triggering a kernel crash.


* Improved fix for CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.

The original fix for CVE-2016-5195 was incomplete when get_user_pages()
was called for multiple pages.


* CVE-2016-1583: Privilege escalation in eCryptfs.

Mounting eCryptfs over procfs could result in a stack overflow with deep
nesting allowing a local, unprivileged user to cause a
denial-of-service, or potentially escalate privileges.


* CVE-2017-2634: Remote denial-of-service in DCCP protocol over IPv6.

Incorrect handling of IPv6 connections when using DCCP could result in
memory corruption.  A remote attacker could use this flaw to crash the
system.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-CloudLinux5-Updates mailing list