[Ksplice][Debian 7.0 Updates] New Ksplice updates for Debian 7.0 Wheezy (3.2.84-2)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Feb 24 13:29:05 PST 2017


Synopsis: 3.2.84-2 can now be patched using Ksplice
CVEs: CVE-2014-9895 CVE-2016-6786 CVE-2016-6787 CVE-2016-8405 CVE-2017-5549 CVE-2017-6001 CVE-2017-6074

Systems running Debian 7.0 Wheezy can now use Ksplice to patch against
the latest Debian kernel update, 3.2.84-2.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Debian 7.0
Wheezy install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option.

A logic error when using IPV6_RECVPKTINFO socket option could lead to a
use-after-free. A local user could use this flaw to cause a
denial-of-service.


* CVE-2014-9895: Kernel information leak in media link enumeration ioctl.

Failing to sanitize a sparse struct before copying it to userspace could
expose kernel stack memory when enumerating links on a generic media
device.


* CVE-2016-6786, CVE-2016-6787: Privilege escalation in kernel performance subsystem.

A locking error during certain migrations in the kernel performance
subsystem could lead to a privilege escalation. A local user could use this
flaw to gain privileges.


* CVE-2016-8405: Information leak via frame buffer color map.

An out-of-bounds read when copying frame buffer color maps to userspace
could potentially expose kernel memory to an unprivileged userspace
application.


* CVE-2017-5549: Information leak when using USB KL5KUSB105 serial driver.

An invalid check when getting line state of KL5KUSB105 USB serial driver
through multiple ioctls leads to a kernel information leak in a log
buffer. A local user could use this flaw to gain information about
running kernel and generate an exploit.


* CVE-2017-6001: Use-after-free in the perf subsystem on concurrent perf_event_open.

Incorrect locking in the perf subsystem could lead to a use-after-free on
concurrent perf_event_open().  A local unprivileged user could use this
flaw to potentially elevate privileges depending on the perf_event paranoid
setting.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-Debian-7.0-Updates mailing list