[Ksplice][Debian 8.0 Updates] New updates available via Ksplice (DSA-3237-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Wed Apr 29 07:07:35 PDT 2015


Synopsis: DSA-3237-1 can now be patched using Ksplice
CVEs: CVE-2015-3331 CVE-2015-3332 CVE-2015-3339

Systems running Debian 8.0 Jessie can now use Ksplice to patch against
the latest Debian Security Advisory, DSA-3237-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Debian 8.0 Jessie
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2015-3331: Denial-of-service in Intel AES RFC4106 decryption.

Incorrect mapping of buffers in the Intel AES RFC4106 implementation
could result in a kernel crash.  A local, unprivileged user with access
to AF_ALG(aead) sockets could use this flaw to trigger a
denial-of-service.


* CVE-2015-3332: Kernel BUG in TCP Fast Open when using GSO.

Incorrect initialisation of Fast Open SYN packets when using GSO could
cause a subsequent kernel BUG. Under certain circumstances, a local
user could take advantage of this to crash the kernel.


* CVE-2015-3339: Privilege escalation due to race condition between execve and chown.

The execve() syscall can race with inode attribute changes made by chown().
This race condition could result in execve() setting uid/gid to the new
owner, leading to privilege escalation.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Debian-8.0-Updates mailing list