[Ksplice][Debian 8.0 Updates] New updates available via Ksplice (DSA 3696-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Oct 21 08:03:42 PDT 2016


Synopsis: DSA 3696-1 can now be patched using Ksplice
CVEs: CVE-2015-8956 CVE-2016-0742 CVE-2016-3134 CVE-2016-5195 CVE-2016-7425

Systems running Debian 8.0 Jessie can now use Ksplice to patch against
the latest Debian kernel update, DSA 3696-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Debian 8.0 Jessie
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2016-0742: Stack corruption when reading keys from proc filesystem.

An on-stack buffer is not big enough to hold the data being written to it
when reading keys from the proc filesystem, potentially leading to a kernel
panic when the stack protector is in use.  A local, unprivileged user could
use this flaw to cause a denial-of-service.


* CVE-2016-7425: Heap corruption in ARECA SATA/SAS RAID host adapter.

Lack of bounds checking when copying data from userspace could lead to heap
corruption.  A local user with the ability to transfer messages to the
ARECA SATA/SAS RAID driver could use this flaw to gain kernel execution.


* CVE-2015-8956: NULL pointer dereference in the Bluetooth stack.

A missing NULL pointer check when binding to a bluetooth socket could cause
a NULL pointer dereference.  A local user with privileges to bind a
bluetooth socket could use this flaw to cause a denial-of-service.


* Improved fix to CVE-2016-3134: Memory corruption when parsing netfilter source chains.

The original upstream fix caused netfilter ruleset loading to require
several minutes, potentially causing soft-lockups.


* CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write.

A race condition in the memory subsystem could allow write access to
otherwise read-only memory mappings.  A local, unprivileged user could use
this flaw to escalate their privileges.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Debian-8.0-Updates mailing list