[Ksplice][Debian 6.0 Updates] New updates available via Ksplice (2.6.32-48squeeze16)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Oct 13 09:58:18 PDT 2015
Synopsis: 2.6.32-48squeeze16 can now be patched using Ksplice
CVEs: CVE-2015-2925 CVE-2015-5257 CVE-2015-7613
Systems running Debian 6.0 Squeeze can now use Ksplice to patch
against the latest Debian kernel update, 2.6.32-48squeeze16.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Debian 6.0 Squeeze
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2015-5257: Denial-of-service in Whiteheat device probing.
Missing validation of USB endpoints could result in a NULL pointer
dereference when probing a Whiteheat USB device. An attacker with a
malicious USB device and physical access to the system could use this
flaw to crash the system.
* CVE-2015-7613: Privilege escalation in IPC object initialization.
Incorrect initialization of IPC objects could result in memory
corruption when creating message queues or shared memory. A local,
unprivileged user could use this flaw to escalate privileges.
* CVE-2015-2925: Privilege escalation in bind mounts inside namespaces.
Incorrect handling of renames inside container bind mounts could allow a
local user to escape a container and escalate privileges under specific
conditions.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Debian-6.0-Updates
mailing list