[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (USN-2560-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Wed Apr 8 17:07:24 PDT 2015
Synopsis: USN-2560-1 can now be patched using Ksplice
CVEs: CVE-2015-1593 CVE-2015-2041 CVE-2015-2042
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-2560-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Use-after-free when unregistering Hyper-V device.
When unregistering a Hyper-V device, a message containing the name of the
device would be printed to the kernel log. However, the name had already
been freed. Dereferencing this buffer could in rare cases cause the
kernel to crash.
* Resource leak in GPIO during sysfs accesses.
Multiple call sites in the GPIO sysfs handling code failed to put
resources on exit. This could result in failure to remove devices and
memory leaks.
* Userspace memory corruption on page walks.
Incorrect handling of mapped files that had not been written to could
result in reading incorrect data when performing a page walk such as
reading /proc/pid/mem.
* Integer overflow in adjtimex syscall.
The adjtimex syscall does not validate the 'freq' argument which can
allow a malicious local user to set the clock frequency to an invalid
value.
* CVE-2015-1593: Stack layout randomization entropy reduction.
A flaw in the the stack base randomization code could result in a
reduction of entropy by a factor of four. An attacker could use this
flaw to reduce the amount of work needed to bypass ASLR.
* CVE-2015-2041: Information leak in 802.2 LLC sysctl interface.
The 802.2 Link Layer type 2 subsystem uses an incorrect length when
returning data to userspace from the sysctl interface, allowing
userspace processes to disclose the contents of kernel memory.
* CVE-2015-2042: Information leak in the Reliable Datagram Socket protocol.
A flaw in the handling of userspace tuning for the Reliable Datagram Socket
(RDS) protocol leads to an information leak when reading from the sysctl
files. A local, privileged user could use this flaw to gain knowledge about
the running kernel, potentially facilitating an attack.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list