[Ksplice][Debian 8.0 Updates] New Ksplice updates for Debian 8.0 Jessie (DSA-3804)
Oracle Ksplice
ksplice-support_ww at oracle.com
Thu Mar 9 23:39:24 PST 2017
Synopsis: DSA-3804 can now be patched using Ksplice
CVEs: CVE-2016-9588 CVE-2017-2636 CVE-2017-5669 CVE-2017-5986 CVE-2017-6214 CVE-2017-6345 CVE-2017-6346 CVE-2017-6348 CVE-2017-6353
Systems running Debian 8.0 Jessie can now use Ksplice to patch against
the latest Debian Security Advisory, DSA-3804.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Debian 8.0
Jessie install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-2636: Privilege escalation in High Level Data Synchronous TTY line discipline.
A race condition when flushing the transmit queue concurently to sending
frames in the HDLC TTY line discipline could lead to a double free. A
local, unprivileged user could use this flaw to elevate his privileges.
* CVE-2017-5986: Denial-of-service when using SCTP socket with concurrent thread.
A BUG_ON() could be triggered when queueing data in a full SCTP socket
while another thread disassociates the first thread from the socket. A
local attacker could use this flaw to cause a denial-of-service.
* CVE-2017-6214: Denial-of-service when splicing from TCP socket.
A specially crafted packet can be queued to trigger an infinite loop in
IPv4 subsystem. This can be exploited by an remote attacker to cause
denial-of-service.
* CVE-2017-6346: Use-after-free in AF_PACKET fanout.
Invalid locking when processing the PACKET_FANOUT sockopt for AF_PACKET sockets
can trigger a use-after-free condition and kernel panic. A local user could use
this flaw to elevate privileges.
* CVE-2016-9588: Denial-of-service in Intel nested VMX exception handling.
Failure to handle exceptions thrown by an L2 guest could result in
kernel crash. A malicious guest could use this flaw to crash the
virtualization host.
* CVE-2017-6348: Deadlock in Infrared socket teardown.
Invalid locking in the infrared networking subsystem can trigger a deadlock and
kernel panic when tearing down sockets. A local user can use this flaw to
trigger a denial of service.
* CVE-2017-6345: Denial of service in 802.2 LLC packet processing.
A logic error when receiving PDUs on an 802.2 LLC network socket can trigger a
kernel panic and denial of service when freeing memory.
* CVE-2017-6353: Denial-of-service when peeling off a sctp socket.
A logic error when peeling off a sctp socket could lead to a double free
or a deadlock. A local user could use this flaw to cause a
denial-of-service.
* CVE-2017-5669: Privilege bypass when using shmat() syscall to map page zero.
A logic error when mapping a page using shmat() syscall could allow a
user to map page zero and consequently bypass a protection mechanism
that exists for the mmap() system call.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Debian-8.0-Updates
mailing list