[Ksplice][Debian 8.0 Updates] New updates available via Ksplice (3.16.7-ckt11-1+deb8u4)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Sep 22 12:13:29 PDT 2015


Synopsis: 3.16.7-ckt11-1+deb8u4 can now be patched using Ksplice
CVEs: CVE-2015-0272 CVE-2015-2925 CVE-2015-5156 CVE-2015-6252 CVE-2015-6937

Systems running Debian 8.0 Jessie can now use Ksplice to patch against
the latest Debian kernel update, 3.16.7-ckt11-1+deb8u4.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Debian 8.0 Jessie
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2015-5156: Denial-of-service in Virtio network device.

Incorrect handling of fragmented socket buffers could result in a buffer
overflow when performing receive offload under specific conditions.  A
local, unprivileged user could use this flaw to crash the system.


* CVE-2015-6937: NULL pointer dereference in RDS socket creation.

Failure to check for binding to a transport could result in a NULL
pointer dereference when creating an RDS socket.  A local, unprivileged
user could use this flaw to crash the system.


* CVE-2015-0272: Remote denial-of-service in IPv6 address autoconfiguration.

Incorrect handling of MTU sysctl setting for an IPv6 device could allow
a remote attacker to trigger packet loss and a denial-of-service under
certain system configurations.


* CVE-2015-6252: Denial-of-service in Virtio networking accelerator.

Missing resource tracking could result in a memory leak when performing
the VHOST_SET_LOG_FD ioctl.  A local, privileged user with access to the
/dev/vhost-net device could use this flaw to trigger a
denial-of-service.


* Denial-of-service in Advanced multi layered unification filesystem mmap().

Incorrect reference counting performing an madvise() or mmap() on an
aufs file could result in a race condition.  A local user with access to
the AUFS filesystem could use this flaw to crash the system, or
potentially, escalate privileges.


* CVE-2015-2925: Privilege escalation in bind mounts inside namespaces.

Incorrect handling of renames inside container bind mounts could allow a
local user to escape a container and escalate privileges under specific
conditions.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Debian-8.0-Updates mailing list