[Ksplice][CloudLinux 5 Updates] New Ksplice updates for CloudLinux 5 (2.6.18-519.el5.lve0.8.91)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Feb 28 07:26:57 PST 2017
Synopsis: 2.6.18-519.el5.lve0.8.91 can now be patched using Ksplice
CVEs: CVE-2013-2596 CVE-2016-1583 CVE-2016-5195 CVE-2017-2634 CVE-2017-6074
Systems running CloudLinux 5 can now use Ksplice to patch against the
latest CloudLinux 5 kernel update, 2.6.18-519.el5.lve0.8.91.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running CloudLinux 5
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option.
A logic error when using IPV6_RECVPKTINFO socket option could lead to a
use-after-free. A local user could use this flaw to cause a
denial-of-service.
* CVE-2013-2596: Privilege escalation in video frame buffer driver.
Integer overflow in the fb_mmap() function allows local users to create a
read-write memory mapping for the entirety of kernel memory, and
consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system
calls.
* Kernel crash in inode instantiation.
Incorrect error handling when instantiating an inode could under
specific conditions result in releasing an already released lock and
triggering a kernel crash.
* Improved fix for CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.
The original fix for CVE-2016-5195 was incomplete when get_user_pages()
was called for multiple pages.
* CVE-2016-1583: Privilege escalation in eCryptfs.
Mounting eCryptfs over procfs could result in a stack overflow with deep
nesting allowing a local, unprivileged user to cause a
denial-of-service, or potentially escalate privileges.
* CVE-2017-2634: Remote denial-of-service in DCCP protocol over IPv6.
Incorrect handling of IPv6 connections when using DCCP could result in
memory corruption. A remote attacker could use this flaw to crash the
system.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-CloudLinux5-Updates
mailing list