[Ksplice][Debian 7.0 Updates] New updates available via Ksplice (DSA 3696-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Oct 21 08:04:50 PDT 2016
Synopsis: DSA 3696-1 can now be patched using Ksplice
CVEs: CVE-2015-8956 CVE-2016-0742 CVE-2016-5195 CVE-2016-7425
Systems running Debian 7.0 Wheezy can now use Ksplice to patch against
the latest Debian kernel update, DSA 3696-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Debian 7.0 Wheezy
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2015-8956: NULL pointer dereference in the Bluetooth stack.
A missing NULL pointer check when binding to a bluetooth socket could cause
a NULL pointer dereference. A local user with privileges to bind a
bluetooth socket could use this flaw to cause a denial-of-service.
* CVE-2016-0742: Stack corruption when reading keys from proc filesystem.
An on-stack buffer is not big enough to hold the data being written to it
when reading keys from the proc filesystem, potentially leading to a kernel
panic when the stack protector is in use. A local, unprivileged user could
use this flaw to cause a denial-of-service.
* CVE-2016-7425: Heap corruption in ARECA SATA/SAS RAID host adapter.
Lack of bounds checking when copying data from userspace could lead to heap
corruption. A local user with the ability to transfer messages to the
ARECA SATA/SAS RAID driver could use this flaw to gain kernel execution.
* CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.
A race condition in the memory subsystem could allow write access to
otherwise read-only memory mappings. A local, unprivileged user could use
this flaw to escalate their privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Debian-7.0-Updates
mailing list